100 likes | 214 Views
Implementation of Secure Cluster Formation and Key Distribution Protocol for Biosensors. Krishna Venkatasubramanian (993-65-5945) CSE 591. Biosensors. Biosensors are sensor nodes placed within the human body for monitoring purposes and collect real-time data about the body.
E N D
Implementation of Secure Cluster Formation and Key Distribution Protocol for Biosensors Krishna Venkatasubramanian (993-65-5945) CSE 591
Biosensors • Biosensors are sensor nodes placed within the human body for monitoring purposes and collect real-time data about the body. • Biosensors monitor: heart rate, blood glucose, temperature and so on. • Other uses of biosensors: controlled drug release, prosthetics, human/animal tracking.
Project Goals • To implement, a secure cluster formation and key exchange protocol for biosensor networks, on Mica2 motes running on TinyOS[2] operating system.
Traditional Cluster Formation • Cluster is one of the topologies used for minimizing communication costs. • Clusters formed based on cluster head solicitation beacon strength. • Traditional cluster formation protocols (LEACH) [3] can lead to sinkhole [4] formation. • Security lapse because of lack of shared secret between cluster head and the cluster member nodes.
Secure Cluster Formation • Idea is to use sensor member nodes to send solicitation beacon. • The designated cluster heads (CH) forward this beacon to the base station along with received signal strength. • Base station decides which node will be part of which cluster. • Uses biometrics to authenticate sensor nodes to cluster head.
Advantages of this scheme • The base station can distribute any control information( keys, MAC schedule etc.) to nodes while forming clusters. • Avoids sink-hole formation completely by involving base station in the formation of clusters. • More energy-efficient: as it allows key distribution along with cluster formation in one step.
Key Distribution • Keys essential for encryption of data being transmitted to base station. • Base station manages all keys. • Keys assigned to nodes based on attributes (location, sensor type) of nodes. • Attribute Based Keying (ABK) allows secure data centric addressing.
Implementation • To implement the protocol we will use the Mica2 motes[1] designed at UC Berkeley and manufactured by Crossbow Inc. • Aim is to implement the protocol in actual sensors and assess the efficiency and security of the protocol.
Timeline • The following is the timeline for this project and some of the important dates:
References • [1] http://www.crossbow.com • [2] http://www.tinyos.net • [3] Wendi Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, Energy-Efficient Communication Protocols for Wireless Microsensor Networks, Proc. Hawaaian Int'l Conf. on Systems Science, January 2000. • [4] Chris Karlof and David Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, First IEEE International Workshop on Sensor Network Protocols and Applications, pages 113-127, May 2003.