200 likes | 781 Views
THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS. Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir. CONTENTS. Introduction WSN Mobile sink Challenges Three-tier security network Advantages Conclusion. INTRODUCTION.
E N D
THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS Presented By : AnkitaJaiswal Guided By : Dr. Agrawal sir
CONTENTS • Introduction • WSN • Mobile sink • Challenges • Three-tier security network • Advantages • Conclusion
INTRODUCTION • In wireless sensor network collecting data from sensor node is complex process because attacker can compromise the network easily • q-composite key pre-distribution techniques used in existing techniques. • If attacker captures fraction of nodes than he will compromise .
Contd……. • Here we are going to strength the authentication mechanism by three tier security scheme. • Blundo scheme provides clear security guarantee in wireless sensor networks and having polynomial pools. • Here attacker compromising network is complex because he have to get at least one polynomial from mobile pool.
WSN • A wireless sensor network (WSN) of spatially distributed autonomous sensor to monitor physical or environmental conditions, such as temperature, sound, pressure, etc.
MOBILE SINK • Mobile sink are vital in many WSN application for efficient data accumulation for distinguishing and revoking compromised sensors.
Existing system and challenges • The problem of authentication and pairwise key establishment in sensor networks with is still not solved in the face of mobile sink replication attacks. • The problem with the basic: • probabilistic key pre-distribution scheme • -q-composite key pre-distribution schemes. • -random pairwise keys scheme
THE THREE-TIER SECURITY SCHEME • In the proposed scheme, we use two separate polynomial pools: • The mobile polynomial pool • The static polynomial pool. • Stationary access nodes, which will enable these mobile sinks to access the sensor network for data gathering.
Fig. The three-tier security scheme in WSN with mobile sinks.
Contd…….. • The three-tier security scheme provides better network resilience and also provides pairwise key establishment. • To avoid Mobile sink replication attack they used the three tier security scheme.
MODULES • Sensor Module • Access Point Module • Mobile Sink Module
Flow chart Start Mobile polynomial pool yes Mobile Sink km key1 km If secure path establis-hed Stationary access node km Static polynomialpool key2 no km Sensor node Do transaction Access Denied End
Advantages • The three-tier security scheme more robust against a stationary access node replication attack • The authentication mechanism between the stationary access nodes and sensor nodes usingone-way hashing algorithm. • Using two separate key pools and having few sensor nodes that carry keys from the mobile key pool.
conclusion • we proposed a general three-tier security framework for authentication and pairwise key establishment between mobile sinks and sensor nodes. • We have further improved the security performance of the proposed scheme against stationary access node replication attack by strengthening the authentication mechanism between stationary access nodes and sensor nodes. • The proposed key distribution scheme reduces the • computational cost in the nodes.
FUTURE SCOPE • Wireless sensor network promise exciting new applications in the near future. • WSN become more and more crucial to everyday life availability faults become less tolerable. • High availability of the nodes critical and must hold even under malicious conditions.
REFRENCES • ‘The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks’ • AmarRasheed, Student Member, IEEE, and Rabi N. Mahapatra, Senior Member, IEEE- May-2012 • ‘Technique to Secure Wireless Sensor Network’ Pramod D Mane 1, Prof. D.H.Kulkarni2 Vol. 4 (6) , 2013, 751-754
AmarRasheed, Student Member, IEEE, and Rabi N.Mahapatra, Senior Member, IEEE ”The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks,” IEEE Transactions on Parallel And Distributed Systems, vol. 23, no. 5, May 2012. • AmrRasheed, Rabi Mahapatra. N. (2012) ‘The Three-Tier Security Scheme in Wireless Sensor Network with Mobile Sinks’ IEEE Transactions on Parallel and Distributed system, IEEE Computer Society, VOL. 23, NO. 5, pp 958-965.