Anda di halaman 1dari 19

Securing WSN using improved INSENS

protocol
A
Project Report
(Phase-1)
Submitted to

MATS UNIVERSITY
AARANG, RAIPUR (C.G.), INDIA
in the partial fulfillment for the award of the Degree
of

Master of Technology
in
Computer Science & Engineering
by
Vipin Bhuarya
(MU13MTCSE022)
Under the Guidance of
Mr. Mohit Srivastava

Department of Computer Science & Engineering


School of Engineering & IT
MATS University, Aarang, Raipur (C.G.), India

December 2013

DECLARATION BY THE CANDIDATE


I the undersigned solemnly declare that the report of the project work entitled Securing
WSN using improved INSENS protocol is based on my own work carried out during the
course of my study under the supervision of Mr. Mohit Srivastava, Raipur.
I assert that the statements made and conclusions drawn are an outcome of my study of
research work. I further declare that remaining and complete research work will be carried out
in Phase-II, which does not contain any part of any work which has been submitted for any
award of degree /diploma/certificate in this University or any other University of India or
abroad.

_________________
(Signature of the Candidate)
Name : Vipin Bhuarya
Roll. No.- MU13MTCSE022
School of Engineering & IT,
Aarang, Raipur (C.G.)

CERTIFICATE BY THE SUPERVISOR

This is to certify that the report of the project entitled Securing WSN using improved
INSENS protocol is a record of research work carried out by Vipin Bhuarya bearing Roll
No.:MU13MTCSE02 & Enrolment No. BGC/0359 under my guidance and supervision for
the submission of Project work Phase-I of Master of Technology in Turbo-Machinery of
MATS University, Raipur (C.G.), India.
To the best of my knowledge and belief the report
i)

Fulfils the requirement of the Ordinance relating to the M.Tech. degree of the
University and

ii)

Is up to the desired standard both in respect of contents and language for being
referred to the examiners.

--------------------

-----------------------

(Signature of Co-ordinator)

(Signature of the Supervisor)

Mr. Brijesh Patel,


School of Engineering & IT,
MATS University, Raipur

Mr. Mohit Srivastava,


School of Engineering & IT,
MATS University, Raipur

Forwarded to MATS University, Raipur

---------------------------------(Signature of the Director)


Dr. A. M. Bisen
School of Engg. & I.T.,
MATS University, Raipur

CERTIFICATE BY THE EXAMINERS

The project entitled Securing WSN using improved INSENS protocol submitted by
Vipin Bhuarya, Roll No.:MU13MTCSE022 , Enrolment No.:BGC/059 has been examined
by the undersigned as a part of the examination and is hereby recommended for the
completion of project work phase-I of the degree of Master of Technology in the faculty of
Computer Science & Engineering, School of Engineering & IT, MATS University, Aarang,
Raipur (C.G.), India.

..

Internal Examiner

External Examiner

Date:

Date:

ACKNOWLEDGEMENT
The contentment, the accomplishment, the magnificence, the fulfilment, the prize admiration
and the creation of my project cannot be thought of without the few, who apart from their
regular schedule spared their valuable time. A number of persons contribute either directly or
indirectly in shaping and achieving the desired outcome.
Apart from the efforts of me, the success of any project depends largely on the encouragement
and guidelines of many others. I take this opportunity to express my gratitude to the people
who have been instrumental in the successful completion of this project.
I would like to extend my gratitude and my sincere thanks to my honorable, esteemed
supervisor Mr. Mohit Srivastava, Department of Computer Science & Engineering. I would
like to show my greatest appreciation to him. I cant say thanks is enough for his
tremendous support and help. I feel motivated and encouraged every time I meet him. Without
his encouragement and guidance this project would not have been materialized.
I owe a debt of appreciation to Mr. Deepak Xaxa Co-ordinator, M. Tech (CSE) for providing
us with an opportunity to develop this project. Through his timely advice, constructive
criticism and supervision he was a real source of inspiration for me. I have had suggestions to
improve this report from a number of my colleagues. I am grateful to Mr. Chandrakant
Mahobiya, Asst. Prof., Department of Computer Science & Engineering and to colleagues
who worked tirelessly in its preparation during the difficult times.
The guidance and support received from all the members of Management and especially to
my college Director to provide me resources for this project was vital for the success of the
project. I am grateful for their constant support and help.
Last but not the least I am really thankful to my family and friends for always encouraging
me to achieve this goal. A special thanks to my parents, who taught me the value of hard
work by their own example and who instilled me the free thinking and the joy of making
researches.
Projectee
Vipin Bhuarya

TABLE OF CONTENTS
Title

Page No.

ABSTRACT .................................................................................................................. i
ACKNOWLEDGEMENTS......................................................................................... ii
TABLE OF CONTENTS............................................................................................. iii
CHAPTER 1 INTRODUCTION
CHAPTER 2 LITERATURE REVIEW
CHAPTER 3 PROBLEM IDENTIFICATION
CHAPTER 3 METHODOLOGY
CHAPTER 5 CONCLUSIONS & FUTURE ENHANCEMENT
REFERENCES

ABSTRACT
Wireless sensor networks face various security concerns in applications such as
battle field monitoring. A central point of failure in a sensor network is the base
station, which acts as a collection point of sensor data.for that the point of failure
is detected then the network is neutralized from the attack.

This thesis paper describes an INtrusion-tolerant routing protocol for wireless


SEnsor NetworkS (INSENS). INSENS securely and eciently constructs treestructured routing for wireless sensor networks (WSNs). The key objective of an
INSENS net-work is to tolerate damage caused by an intruder who has
compromised deployed sensor nodes and is intent on injecting, modifying, or
blocking packets. To limit or localize the damage caused by such an intruder,
INSENS incorporates distributed lightweight security mechanisms, including
ecient one way hash chains and nested keyed message authentication codes
that defend against wormhole attacks, as well as multipath routing. Adapting to
WSN characteristics, the design of INSENS also pushes complexity away from
resource-poor sensor nodes towards resource rich base stations. An improved
single-phase version of INSENS scales to large networks, in-tegrates bidirectional
verification to defend against rushing attacks, accommodates multipath routing to
multiple base stations, enables secure joining/leaving, and in-corporates a novel
pairwise key setup scheme based on transitory global keys that is more resilient
than LEAP. Simulation results are presented to demonstrate and assess the
tolerance of INSENS to various attacks launched by an adversary

Chapter 1
Introduction
Wireless Sensor Networks(WSN) have gained world-wide attention in recent
years due to the advances made in wireless communication, information
technologies and electronics field [1,2].The concept of wireless sensor networks is
based on a simple equation: Sensing + CPU + Radio = Thousands of potential
applications [6] . It is a sensing technology where tiny, autonomous and compact
devices called sensor nodes or motes deployed in a remote area to detect
phenomena, collect and process data and transmit sensed information to users.
The development of low-cost, low-power, a multifunctional sensor has received
increasing attention from various industries. Sensor nodes or motes in WSNs are
small sized and are capable of sensing, gathering and processing data while
communicating with other connected nodes in the network, via radio frequency
(RF) channel.
WSN term can be broadly sensed as devices range from laptops, PDAs or mobile
phones to very tiny and simple sensing devices. At present, most available
wireless sensor devices are considerably constrained in terms of computational
power ,memory, eciency and communication capabilities due to economic and
technology reasons. Thats why most of the research on WSNs has concentrated
on the design of energy and computationally e cient algorithms and protocols,
and the application domain has been confined to simple data- oriented monitoring
and reporting applications. WSNs nodes are battery powered which are deployed
to perform a specific task for a long period of time, even years. If WSNs nodes are
more powerful or mains-powered devices in the vicinity, it is beneficial to utilize
their computation and communication resources for complex algorithms and as
gateways to other networks. New network architectures with heterogeneous
devices and expected advances in technology are eliminating current limitations
and expanding the spectrum of possible applications for WSNs considerably.

Applications of Wireless Sensor Networks


According to a new report from research firm ON World. The home market for
Wireless Sensor Networks (WSN) will reach US$6 billion a year by 2012. The prediction includes both products and services centred on in-home energy
management and health monitoring. Meanwhile, ON World predicts the market for
Home Area Network (HAN) energy management solutions to reach 20 million
homes worldwide by 2013.
Wireless Sensor Networks may consist of many di erent types of sensors such as
seismic, low sampling rate magnetic, thermal, visual, infrared, acoustic and radar.
They are able to monitor a wide variety of ambient conditions that include
tempera-ture, humidity, vehicular movement, lightning condition, pressure, soil
makeup, noise levels, the presence or absence of certain kinds of objects,
mechanical stress levels on attached objects, and the current characteristics such
as speed, direction and size of an object. WSN applications can be classified into
two categories.
Monitoring
Tracking
Military applications
The rapid deployment, self-organization and fault tolerance characteristics of sen-sor
networks make them a very promising sensing technique for military command, control,
communications, computing, intelligence, surveillance, reconnaissance and targeting
(C4ISRT) systems. Military sensor networks could be used to detect and gain as much
information as possible about enemy movements, explosions, and other phenomena of
interest, such as battlefield surveillance, nuclear, biological and chem-ical attack detection
and reconnaissance. As an example, PinPtr is an experimental counter-sniper system
developed to detect and locate shooters. The system utilizes a dense deployment of
sensors to detect and measure the time of arrival of muzzle blasts and shock waves from
a shot. Sensors route their measurements to a base station (e.g., a laptop or PDA) to
compute the shooters location. Sensors in the PinPtr system are second-generation
Mica2 motes connected to a multi-purpose acoustic sensor board. Each multi-purpose
acoustic sensor board is designed with three acoustic channels and a Xilinx Spartan II

FPGA. Mica2 motes run on a TinyOS operating system platform that handles task
scheduling, radio communication, time, I/O processing, etc. Mid-dleware services
developed on TinyOS that are exploited in this application include time synchronization,
message routing with data aggregation, and localization.

Environmental applications
Wireless Sensor Networks have been deployed for environmental monitoring,
which involves tracking the movements of small animals and monitoring
environmental con-ditions that aect crops and livestock. In these applications,
WSNs collect readings over time across a space large enough to exhibit
significant internal variation. Other applications of WSNs are chemical and
biological detection, precision agriculture, biological, forest fire detection, volcanic
monitoring, meteorological or geophysical research, flood detection and pollution
study.
Macroscope of redwood is a case study of a WSN that monitors and records the
redwood trees in Sonoma, California. Each sensor node measures air
temperature, relative humidity, and photo-synthetically-active solar radiation.
Sensor nodes are placed at dierent heights of the tree. Plant biologists track
changes of spatial gradi-ents in the microclimate around a redwood tree and
validate their biological theories.
AT&T recently introduced a telehealth monitoring service that uses ZigBee and
WiFi. Mote Track is the patient tracking system developed by Harvard University,
which tracks the location of individual patients devices indoors and outdoors,
using radio signal information from the sensor attached to the patients.
Heart@Home is a wireless blood pressure monitor and tracking system.
Heart@Home uses a SHIMMER mote located inside a wrist cu which is
connected to a pressure sensor. A users blood pressure and heart rate is
computed using the oscillometric method. The SHIMMER mote records the
reading and sends it to the T- mote connected to the users computer. A software
application processes the data and provides a graph of the users blood pressure
and heart rate over time.

Home applications
With the advance of technology, the tiny sensor nodes can be embedded into
furniture and appliances, such as vacuum cleaners, microwave ovens and
refrigerators. They are able to communicate with each other and the room server
to learn about the services they oer, e.g., printing, scanning and faxing. These
room servers and sensor nodes can be integrated with existing embedded
devices to become self-organizing, self-regulated and adaptive systems to form a
smart environment. Automated homes with Personal Area Networks such as
ZigBee can provide the ability to monitor and control mechanisms like light
switches and lights, HVAC (heating, ventilating, air conditioning) controls and
thermostats; computers, TVs and other electronic devices, smoke detectors and
other safety equipment; alarm panels, motion sensors, and other security devices;
and electricity, water and gas meters.

Chapter 2
Literature Survey
2.1 A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks
The severe constraints and demanding deployment environments of wireless
sensor networks make security for these systems more challenging than for
conventional net-works. However, several properties of sensor networks may help
address the challenge of building secure networks. The unique aspects of sensor
networks may allow novel defenses not available in conventional networks.
Tesla protocols provide efficient authenticated broadcast and achieves
asymmetric cryptography by delaying the disclosure of the symmetric keys. Tesla
constructs authenticated broadcast from symmetric primitives, but introduces
asymmetry with delayed key disclosure and one-way function key chains. TESLA
solves the following inadequacies of TESLA in sensor networks: TESLA
authenticates the initial packet with a digital signature, which is too expensive for
our sensor nodes. TESLA uses only symmetric mechanisms.

2.2 INSENS: Intrusion-tolerant routing for wire-less


sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor
Net-workS (INSENS). INSENS securely and eciently constructs tree-structured
routing for wireless sensor networks (WSNs). The key objective of an INSENS
network is to tolerate damage caused by an intruder who has compromised
deployed sensor nodes and is intent on injecting, modifying, or blocking packets.
To limit or localize the damage caused by such an intruder, INSENS incorporates
distributed lightweight se-curity mechanisms, including e cient oneway hash
chains and nested keyed message authentication codes that defend against
wormhole attacks, as well as multipath rout-ing. Adapting to WSN characteristics,
the design of INSENS also pushes complexity away from resource-poor sensor
nodes towards resource-rich base stations. This paper focuses on the design of a
secure and INtrusion-tolerant routing protocol for wireless Sensor NetworkS
(INSENS). INSENS constructs secure and ecient tree-structured

Chapter 3
Problem Identification

There are several limitations on security, scalability, and maintenance of the basic
INSENS protocol. First, the assumption about a wireless communication channel
being symmetric is not valid for many WSNs. As a result, although a node u can
receive a request message from node v, it may not be able to send its feedback
message to v. Even worse, an adversary can expolit this asymmetry to launch a
rushing attack to capture a large number of sensor nodes. In such an attack, after
receiving an REQ message with the correct current OHC, the attacker floods a
fake REQ message at a higher signal rate, thereby causing more nodes to view
itself as the base station. Second, depending on the density of the network, the
feedback message can be too long to first into a single packet. Also, the overhead
of forwarding these feedback messages across multiple hops, and of forwarding
the routing tables across multiple hops, can be quite high if the size of sensor
network is large. Third, since the base station needs to compute routing paths for
each sensor node, it can get overloaded with processing if the network is large.
Finally, the basic algorithm doesnt address the issue of maintaining network
routing when some existing nodes fail or some new nodes join the network.
The INSENS protocol takes an assumption that the wireless communication
channel to be symmetry in nature. The assumption about a wireless
communication channel being symmetric is not valid for many WSNs. As a
result,although a node u can receive a request message from node v, it may not
be able to send its feedback message to v. Even worse, an adversary can exploit
this asymmetry to launch a rushing attack to capture a large number of sensor
nodes. In such an attack, after receiving an REQ message with the correct current
OHC, the attacker floods a fake REQ message at a higher signal rate, thereby
causing more nodes to view itself as the base station. Second, depending on the
density of the network, the feedback message can be too long to fit into a single
packet. Also, the overhead of forwarding these feedback messages across

multiple hops, and of forwarding the routing tables across multiple hops, can be
quite high if the size of sensor network is large. Third, since the base station
needs to compute routing paths for each sensor node, it can get overloaded with
processing if the network is large. Finally, the basic algorithm doesnt address the
issue of maintaining network routing when some existing nodes fail or some new
nodes join the network.

Chapter 4
Proposed Methodology
To overcome the drawbacks raised in INSENS protocol we introduced a new
protocol named IMPROVED INSENS which will give better performance as
compared to the former. The IMPROVED INSENS protocol incorporates several
unique features and countermeasures to address the limitations of the basic
INSENS protocol: (1)bidi-rectional verification is used to defend against the
rushing attack; (2) multiple paths to multiple base stations is used to make
INSENS more scalable for larger sensor networks; and (3) a set of secure
maintenance mechanisms are introduced to manage node joining and leaving in a
network.

Chapter 4
Proposed Output
After deploying bi-directional vereification and multi-path base routing, we are

expecting to overcome the limitation of the INSENS protocol.

Chapter 4
Conclusion of Phase-1
After completion of the proposed methods, the INSENS protocol will show improved
efficiency and less chance of security attacks

References
A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor
Networks Shio Kumar Singh , M P Singh , and D K Singh
J. Deng, R. Han, S. Mishra, The performance evaluation of intrusion-tolerant routing
in wireless sensor networks, IEEE

Anda mungkin juga menyukai