protocol
A
Project Report
(Phase-1)
Submitted to
MATS UNIVERSITY
AARANG, RAIPUR (C.G.), INDIA
in the partial fulfillment for the award of the Degree
of
Master of Technology
in
Computer Science & Engineering
by
Vipin Bhuarya
(MU13MTCSE022)
Under the Guidance of
Mr. Mohit Srivastava
December 2013
_________________
(Signature of the Candidate)
Name : Vipin Bhuarya
Roll. No.- MU13MTCSE022
School of Engineering & IT,
Aarang, Raipur (C.G.)
This is to certify that the report of the project entitled Securing WSN using improved
INSENS protocol is a record of research work carried out by Vipin Bhuarya bearing Roll
No.:MU13MTCSE02 & Enrolment No. BGC/0359 under my guidance and supervision for
the submission of Project work Phase-I of Master of Technology in Turbo-Machinery of
MATS University, Raipur (C.G.), India.
To the best of my knowledge and belief the report
i)
Fulfils the requirement of the Ordinance relating to the M.Tech. degree of the
University and
ii)
Is up to the desired standard both in respect of contents and language for being
referred to the examiners.
--------------------
-----------------------
(Signature of Co-ordinator)
The project entitled Securing WSN using improved INSENS protocol submitted by
Vipin Bhuarya, Roll No.:MU13MTCSE022 , Enrolment No.:BGC/059 has been examined
by the undersigned as a part of the examination and is hereby recommended for the
completion of project work phase-I of the degree of Master of Technology in the faculty of
Computer Science & Engineering, School of Engineering & IT, MATS University, Aarang,
Raipur (C.G.), India.
..
Internal Examiner
External Examiner
Date:
Date:
ACKNOWLEDGEMENT
The contentment, the accomplishment, the magnificence, the fulfilment, the prize admiration
and the creation of my project cannot be thought of without the few, who apart from their
regular schedule spared their valuable time. A number of persons contribute either directly or
indirectly in shaping and achieving the desired outcome.
Apart from the efforts of me, the success of any project depends largely on the encouragement
and guidelines of many others. I take this opportunity to express my gratitude to the people
who have been instrumental in the successful completion of this project.
I would like to extend my gratitude and my sincere thanks to my honorable, esteemed
supervisor Mr. Mohit Srivastava, Department of Computer Science & Engineering. I would
like to show my greatest appreciation to him. I cant say thanks is enough for his
tremendous support and help. I feel motivated and encouraged every time I meet him. Without
his encouragement and guidance this project would not have been materialized.
I owe a debt of appreciation to Mr. Deepak Xaxa Co-ordinator, M. Tech (CSE) for providing
us with an opportunity to develop this project. Through his timely advice, constructive
criticism and supervision he was a real source of inspiration for me. I have had suggestions to
improve this report from a number of my colleagues. I am grateful to Mr. Chandrakant
Mahobiya, Asst. Prof., Department of Computer Science & Engineering and to colleagues
who worked tirelessly in its preparation during the difficult times.
The guidance and support received from all the members of Management and especially to
my college Director to provide me resources for this project was vital for the success of the
project. I am grateful for their constant support and help.
Last but not the least I am really thankful to my family and friends for always encouraging
me to achieve this goal. A special thanks to my parents, who taught me the value of hard
work by their own example and who instilled me the free thinking and the joy of making
researches.
Projectee
Vipin Bhuarya
TABLE OF CONTENTS
Title
Page No.
ABSTRACT .................................................................................................................. i
ACKNOWLEDGEMENTS......................................................................................... ii
TABLE OF CONTENTS............................................................................................. iii
CHAPTER 1 INTRODUCTION
CHAPTER 2 LITERATURE REVIEW
CHAPTER 3 PROBLEM IDENTIFICATION
CHAPTER 3 METHODOLOGY
CHAPTER 5 CONCLUSIONS & FUTURE ENHANCEMENT
REFERENCES
ABSTRACT
Wireless sensor networks face various security concerns in applications such as
battle field monitoring. A central point of failure in a sensor network is the base
station, which acts as a collection point of sensor data.for that the point of failure
is detected then the network is neutralized from the attack.
Chapter 1
Introduction
Wireless Sensor Networks(WSN) have gained world-wide attention in recent
years due to the advances made in wireless communication, information
technologies and electronics field [1,2].The concept of wireless sensor networks is
based on a simple equation: Sensing + CPU + Radio = Thousands of potential
applications [6] . It is a sensing technology where tiny, autonomous and compact
devices called sensor nodes or motes deployed in a remote area to detect
phenomena, collect and process data and transmit sensed information to users.
The development of low-cost, low-power, a multifunctional sensor has received
increasing attention from various industries. Sensor nodes or motes in WSNs are
small sized and are capable of sensing, gathering and processing data while
communicating with other connected nodes in the network, via radio frequency
(RF) channel.
WSN term can be broadly sensed as devices range from laptops, PDAs or mobile
phones to very tiny and simple sensing devices. At present, most available
wireless sensor devices are considerably constrained in terms of computational
power ,memory, eciency and communication capabilities due to economic and
technology reasons. Thats why most of the research on WSNs has concentrated
on the design of energy and computationally e cient algorithms and protocols,
and the application domain has been confined to simple data- oriented monitoring
and reporting applications. WSNs nodes are battery powered which are deployed
to perform a specific task for a long period of time, even years. If WSNs nodes are
more powerful or mains-powered devices in the vicinity, it is beneficial to utilize
their computation and communication resources for complex algorithms and as
gateways to other networks. New network architectures with heterogeneous
devices and expected advances in technology are eliminating current limitations
and expanding the spectrum of possible applications for WSNs considerably.
FPGA. Mica2 motes run on a TinyOS operating system platform that handles task
scheduling, radio communication, time, I/O processing, etc. Mid-dleware services
developed on TinyOS that are exploited in this application include time synchronization,
message routing with data aggregation, and localization.
Environmental applications
Wireless Sensor Networks have been deployed for environmental monitoring,
which involves tracking the movements of small animals and monitoring
environmental con-ditions that aect crops and livestock. In these applications,
WSNs collect readings over time across a space large enough to exhibit
significant internal variation. Other applications of WSNs are chemical and
biological detection, precision agriculture, biological, forest fire detection, volcanic
monitoring, meteorological or geophysical research, flood detection and pollution
study.
Macroscope of redwood is a case study of a WSN that monitors and records the
redwood trees in Sonoma, California. Each sensor node measures air
temperature, relative humidity, and photo-synthetically-active solar radiation.
Sensor nodes are placed at dierent heights of the tree. Plant biologists track
changes of spatial gradi-ents in the microclimate around a redwood tree and
validate their biological theories.
AT&T recently introduced a telehealth monitoring service that uses ZigBee and
WiFi. Mote Track is the patient tracking system developed by Harvard University,
which tracks the location of individual patients devices indoors and outdoors,
using radio signal information from the sensor attached to the patients.
Heart@Home is a wireless blood pressure monitor and tracking system.
Heart@Home uses a SHIMMER mote located inside a wrist cu which is
connected to a pressure sensor. A users blood pressure and heart rate is
computed using the oscillometric method. The SHIMMER mote records the
reading and sends it to the T- mote connected to the users computer. A software
application processes the data and provides a graph of the users blood pressure
and heart rate over time.
Home applications
With the advance of technology, the tiny sensor nodes can be embedded into
furniture and appliances, such as vacuum cleaners, microwave ovens and
refrigerators. They are able to communicate with each other and the room server
to learn about the services they oer, e.g., printing, scanning and faxing. These
room servers and sensor nodes can be integrated with existing embedded
devices to become self-organizing, self-regulated and adaptive systems to form a
smart environment. Automated homes with Personal Area Networks such as
ZigBee can provide the ability to monitor and control mechanisms like light
switches and lights, HVAC (heating, ventilating, air conditioning) controls and
thermostats; computers, TVs and other electronic devices, smoke detectors and
other safety equipment; alarm panels, motion sensors, and other security devices;
and electricity, water and gas meters.
Chapter 2
Literature Survey
2.1 A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks
The severe constraints and demanding deployment environments of wireless
sensor networks make security for these systems more challenging than for
conventional net-works. However, several properties of sensor networks may help
address the challenge of building secure networks. The unique aspects of sensor
networks may allow novel defenses not available in conventional networks.
Tesla protocols provide efficient authenticated broadcast and achieves
asymmetric cryptography by delaying the disclosure of the symmetric keys. Tesla
constructs authenticated broadcast from symmetric primitives, but introduces
asymmetry with delayed key disclosure and one-way function key chains. TESLA
solves the following inadequacies of TESLA in sensor networks: TESLA
authenticates the initial packet with a digital signature, which is too expensive for
our sensor nodes. TESLA uses only symmetric mechanisms.
Chapter 3
Problem Identification
There are several limitations on security, scalability, and maintenance of the basic
INSENS protocol. First, the assumption about a wireless communication channel
being symmetric is not valid for many WSNs. As a result, although a node u can
receive a request message from node v, it may not be able to send its feedback
message to v. Even worse, an adversary can expolit this asymmetry to launch a
rushing attack to capture a large number of sensor nodes. In such an attack, after
receiving an REQ message with the correct current OHC, the attacker floods a
fake REQ message at a higher signal rate, thereby causing more nodes to view
itself as the base station. Second, depending on the density of the network, the
feedback message can be too long to first into a single packet. Also, the overhead
of forwarding these feedback messages across multiple hops, and of forwarding
the routing tables across multiple hops, can be quite high if the size of sensor
network is large. Third, since the base station needs to compute routing paths for
each sensor node, it can get overloaded with processing if the network is large.
Finally, the basic algorithm doesnt address the issue of maintaining network
routing when some existing nodes fail or some new nodes join the network.
The INSENS protocol takes an assumption that the wireless communication
channel to be symmetry in nature. The assumption about a wireless
communication channel being symmetric is not valid for many WSNs. As a
result,although a node u can receive a request message from node v, it may not
be able to send its feedback message to v. Even worse, an adversary can exploit
this asymmetry to launch a rushing attack to capture a large number of sensor
nodes. In such an attack, after receiving an REQ message with the correct current
OHC, the attacker floods a fake REQ message at a higher signal rate, thereby
causing more nodes to view itself as the base station. Second, depending on the
density of the network, the feedback message can be too long to fit into a single
packet. Also, the overhead of forwarding these feedback messages across
multiple hops, and of forwarding the routing tables across multiple hops, can be
quite high if the size of sensor network is large. Third, since the base station
needs to compute routing paths for each sensor node, it can get overloaded with
processing if the network is large. Finally, the basic algorithm doesnt address the
issue of maintaining network routing when some existing nodes fail or some new
nodes join the network.
Chapter 4
Proposed Methodology
To overcome the drawbacks raised in INSENS protocol we introduced a new
protocol named IMPROVED INSENS which will give better performance as
compared to the former. The IMPROVED INSENS protocol incorporates several
unique features and countermeasures to address the limitations of the basic
INSENS protocol: (1)bidi-rectional verification is used to defend against the
rushing attack; (2) multiple paths to multiple base stations is used to make
INSENS more scalable for larger sensor networks; and (3) a set of secure
maintenance mechanisms are introduced to manage node joining and leaving in a
network.
Chapter 4
Proposed Output
After deploying bi-directional vereification and multi-path base routing, we are
Chapter 4
Conclusion of Phase-1
After completion of the proposed methods, the INSENS protocol will show improved
efficiency and less chance of security attacks
References
A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor
Networks Shio Kumar Singh , M P Singh , and D K Singh
J. Deng, R. Han, S. Mishra, The performance evaluation of intrusion-tolerant routing
in wireless sensor networks, IEEE