SlideShare uma empresa Scribd logo
1 de 11
A Bandwidth-Efficient
Cooperative Authentication
Scheme for Filtering Injected
False Data in Wireless Sensor
Networks
Wireless Sensor Networks
 Composed of a large number of sensor nodes which are interconnected
through wireless links
 Sensor node is low-cost
 Sensor nodes are equipped with necessary sensing, data processing, and
communicating components
 Sink (Data collection and processing unit)
 Routers
Attacks to wireless sensor network
Wireless sensor networks are usually deployed at unattended or hostile
environments. Therefore, they are very vulnerable to various security attacks,
such as
 selective forwarding
 wormholes
 Sybil attacks
 injecting false data attack
False data attack
 For an injecting false data attack, an adversary first compromises several
sensor nodes, accesses all keying materials stored in the compromised nodes,
and then controls these compromised nodes to inject bogus information and
send the false data to the sink to cause upper level error decision as well as
energy wasted in en-route nodes
 An adversary could fabricate a wildfire event or report a wrong wildfire
location information to the sink, then expensive resources will be wasted by
sending rescue workers to a non-existing or wrong wildfire location
 All false data are flooding into the sink simultaneously, huge energy will be
wasted in the en-route nodes, & also heavy verification burdens will
undoubtedly fall on the sink
Network model
Network Model Cont…

BECAN Scheme
 Uses cooperative neighbor × router (CNR) based filtering mechanism
BECAN Scheme Cont…
 TinyECC-Based Non-Interactive Key Pair Establishment
Yi =xiG
Where yi = Public key
xi = Private key
G = Generation polynominal
 Non-interactive key pair establishment
A secure Elliptic Curve Diffie-Hellman (ECDH) key pair
kij =xiYj =xixjG=xjxiG=xjYi =kji
Advantages of BECAN Scheme
 High filtering probability and energy saving.
 Detect injecting false data attack.
 BECAN Scheme in terms of en-routing filtering probability and false negative
rate on true reports.
 Early detecting the injected false data by the en-route sensor nodes.
 Sink Verification prevent/Mitigate the gang injecting false data attack from
mobile compromised sensor nodes
Working Model Based on BECAN Scheme
Using C#.Net Coding
References
 Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor
Networks,“ IEEE Transactions on Parallel and Distributed Systems, vol.23, pp. 32-43, Jan 2012.
 [2] S. He, J. Chen, Y. Sun, D. K. Y. Yau, and N. K. Yip, “On optimal information capture by energy-constrained
mobile sensors,” IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2472–2484, June 2010.
 [3] X. Li, A. Nayak, D. Simplot-Ryl, and I. Stojmenovic, “Sensor placement in sensor and actuator networks,”
Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data
Communication, Wiley, 2010.
 [4] X. Lin, “CAT: Building couples to early detect node compromise attack in wireless sensor networks,” in Proc.
IEEE GLOBECOM’09, Honolulu, Hawaii, USA, Nov. 30 - Dec. 4 2009.
 [5] X. Li, N. Santoro, and I. Stojmenovic, “Localized distance - sensitive service discovery in wireless sensor and
actor networks,” IEEE Transactions on Computers, vol. 58, no. 9, pp. 1275–1288, 2009.
 [6] R. Lu, X. Lin, C. Zhang, H. Zhu, P. Ho, and X. Shen, “AICN: an efficient algorithm to identify compromised
nodes in wireless sensor network,” in Proc. IEEE ICC’08, Beijing, China, May 19-23 2008.
 [7] V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, “Security in wireless sensor networks,” Wireless
Communications and Mobile Computing, vol. 8, no. 1, pp. 1–24, January 2008.
 [8] A. Liu and P. Ning, “TinyECC: a configurable library for elliptic curve cryptography in wireless sensor
networks,” in IPSN 2008, April 2008, pp. 245–256, sPOTS Track.
 [9] X. Lin, R. Lu, P. Ho, X. Shen, and Z. Cao, “TUA: A novel compromise-resilient authentication architecture for
wireless mesh networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1389–1399, 2008.
 [10] C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, “An efficient identity-based batch verification scheme for
vehicular sensor networks,” in IEEE INFOCOM’08, Phoenix, AZ, USA, April 14-18 2008.

Mais conteúdo relacionado

Mais procurados

Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...
Ecway Technologies
 
Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...
Ecwaytech
 
Abstract sensor networks
Abstract sensor networksAbstract sensor networks
Abstract sensor networks
Gaurav Tiwari
 
2013 ieee project ns2 titles
2013 ieee project ns2 titles2013 ieee project ns2 titles
2013 ieee project ns2 titles
ecwayerode
 

Mais procurados (9)

Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...
 
Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...Towards the implementation of iot for environmental condition monitoring in h...
Towards the implementation of iot for environmental condition monitoring in h...
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Abstract sensor networks
Abstract sensor networksAbstract sensor networks
Abstract sensor networks
 
2013 ieee ns2 project titles
2013 ieee ns2 project titles2013 ieee ns2 project titles
2013 ieee ns2 project titles
 
2013 ieee project ns2 titles
2013 ieee project ns2 titles2013 ieee project ns2 titles
2013 ieee project ns2 titles
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 

Destaque

Final year projects in chennai,Final year projects at tamilnadu, Final year p...
Final year projects in chennai,Final year projects at tamilnadu, Final year p...Final year projects in chennai,Final year projects at tamilnadu, Final year p...
Final year projects in chennai,Final year projects at tamilnadu, Final year p...
Suresh Radhakrishnan
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Shreyas Tote
 

Destaque (8)

Opeed optimal energy efficient neighbor discovery scheme in opportunistic ne...
Opeed  optimal energy efficient neighbor discovery scheme in opportunistic ne...Opeed  optimal energy efficient neighbor discovery scheme in opportunistic ne...
Opeed optimal energy efficient neighbor discovery scheme in opportunistic ne...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Final year projects in chennai,Final year projects at tamilnadu, Final year p...
Final year projects in chennai,Final year projects at tamilnadu, Final year p...Final year projects in chennai,Final year projects at tamilnadu, Final year p...
Final year projects in chennai,Final year projects at tamilnadu, Final year p...
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
 
DFD
DFDDFD
DFD
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 

Semelhante a becan

Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
ijdpsjournal
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 ch
IJECEIAES
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
IJCSIS Research Publications
 

Semelhante a becan (20)

An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
A05510105
A05510105A05510105
A05510105
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 ch
 
Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...
 
Ids presentation
Ids presentationIds presentation
Ids presentation
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 
P017129296
P017129296P017129296
P017129296
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
 
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 

becan

  • 1. A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
  • 2. Wireless Sensor Networks  Composed of a large number of sensor nodes which are interconnected through wireless links  Sensor node is low-cost  Sensor nodes are equipped with necessary sensing, data processing, and communicating components  Sink (Data collection and processing unit)  Routers
  • 3. Attacks to wireless sensor network Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks, such as  selective forwarding  wormholes  Sybil attacks  injecting false data attack
  • 4. False data attack  For an injecting false data attack, an adversary first compromises several sensor nodes, accesses all keying materials stored in the compromised nodes, and then controls these compromised nodes to inject bogus information and send the false data to the sink to cause upper level error decision as well as energy wasted in en-route nodes  An adversary could fabricate a wildfire event or report a wrong wildfire location information to the sink, then expensive resources will be wasted by sending rescue workers to a non-existing or wrong wildfire location  All false data are flooding into the sink simultaneously, huge energy will be wasted in the en-route nodes, & also heavy verification burdens will undoubtedly fall on the sink
  • 7. BECAN Scheme  Uses cooperative neighbor × router (CNR) based filtering mechanism
  • 8. BECAN Scheme Cont…  TinyECC-Based Non-Interactive Key Pair Establishment Yi =xiG Where yi = Public key xi = Private key G = Generation polynominal  Non-interactive key pair establishment A secure Elliptic Curve Diffie-Hellman (ECDH) key pair kij =xiYj =xixjG=xjxiG=xjYi =kji
  • 9. Advantages of BECAN Scheme  High filtering probability and energy saving.  Detect injecting false data attack.  BECAN Scheme in terms of en-routing filtering probability and false negative rate on true reports.  Early detecting the injected false data by the en-route sensor nodes.  Sink Verification prevent/Mitigate the gang injecting false data attack from mobile compromised sensor nodes
  • 10. Working Model Based on BECAN Scheme Using C#.Net Coding
  • 11. References  Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks,“ IEEE Transactions on Parallel and Distributed Systems, vol.23, pp. 32-43, Jan 2012.  [2] S. He, J. Chen, Y. Sun, D. K. Y. Yau, and N. K. Yip, “On optimal information capture by energy-constrained mobile sensors,” IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2472–2484, June 2010.  [3] X. Li, A. Nayak, D. Simplot-Ryl, and I. Stojmenovic, “Sensor placement in sensor and actuator networks,” Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication, Wiley, 2010.  [4] X. Lin, “CAT: Building couples to early detect node compromise attack in wireless sensor networks,” in Proc. IEEE GLOBECOM’09, Honolulu, Hawaii, USA, Nov. 30 - Dec. 4 2009.  [5] X. Li, N. Santoro, and I. Stojmenovic, “Localized distance - sensitive service discovery in wireless sensor and actor networks,” IEEE Transactions on Computers, vol. 58, no. 9, pp. 1275–1288, 2009.  [6] R. Lu, X. Lin, C. Zhang, H. Zhu, P. Ho, and X. Shen, “AICN: an efficient algorithm to identify compromised nodes in wireless sensor network,” in Proc. IEEE ICC’08, Beijing, China, May 19-23 2008.  [7] V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, “Security in wireless sensor networks,” Wireless Communications and Mobile Computing, vol. 8, no. 1, pp. 1–24, January 2008.  [8] A. Liu and P. Ning, “TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks,” in IPSN 2008, April 2008, pp. 245–256, sPOTS Track.  [9] X. Lin, R. Lu, P. Ho, X. Shen, and Z. Cao, “TUA: A novel compromise-resilient authentication architecture for wireless mesh networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1389–1399, 2008.  [10] C. Zhang, R. Lu, X. Lin, P. Ho, and X. Shen, “An efficient identity-based batch verification scheme for vehicular sensor networks,” in IEEE INFOCOM’08, Phoenix, AZ, USA, April 14-18 2008.