secure synchronization with trust evaluation model (stem) for wireless sensor networks

Upload: sam4ets

Post on 07-Jul-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    1/33

    Secure Synchronization with

    Trust Evaluation Model (STEM)for Wireless Sensor Networks

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    2/33

    INDEX

    •Objective

    •Existing system

    • Proposed system

    •Dataflow Diagram

    •Modules description

    •Requirements

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    3/33

    OBJECTIVE

    •To obtain ealty pac!ets by "yncroni#ing

    events and increasing te cloc! precision

    wit energy saving for addressing te inside

    treats$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    4/33

    EXISTING SYSTEM

    • "ecure "yncroni#ation$

    •%ig energy consumption$

    • "O&'" is better only wen oter similar

    scemes do not employ (P" devices$

    •)loc! precision can still be reduced$

    • *o attac!ers analysis is available$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    5/33

    PROPOSED SYSTEM

    • +ilter te malicious data by using Dynamic En,route

    filtering mecanism$

    • To save energy communication in te networ! is

    minimi#ed$

    • -t provides more cloc! precision tan te existing

    system$

    • .itout explicit syncroni#ation control messages it

    syncroni#e te events in te networ!$• 'ddresses attac!ers in te networ!$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    6/33

    System Architecture

     

    TKM Module

    Encryption orHashing

    Difuser

     

    CRYPTO Module 

    No-ReEnc

    Full- ReEnc

    Selective-ReEnc

    Filtering andForwarding

    Module

    Full Path

    Synchronization

    Partial Path

    Synchronization

    Packets

    AR!

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    7/33

    DATA FLO

    DIAGRAM

    Packets

     "i#e $ase% key

    #anage#ent

    #o%ule

    rypto

    #o%ule

    Filter %ata For&ar% %ata

    'oose

    synchronization

    Selective reEnc Full reEncNo reEnc

    Analysis o( outsi%er

    attackers

    A%%ressing insi%e

    threats

    Healthy Packets

    )alicious no%e

    analysis

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    8/33

    MOD!LES

    Time &ased /ey Management 0T/M1

    Module$

    )R2PTO Module$+iltering 'nd +orwarding "yncroni#ation

    0++"1 Module$

    "elective Re,Encryption Module$

    'nalysis of 'ttac!ers$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    9/33

     "*)E +ASE ,E )ANA.E)EN" )/D0'E

    • /eys are generated dynamically using local time0localcloc! value1$

    • /eys are a function of te current local time value 0tl1

    and eiter an -nitiali#ation vector0-31 or previous

    !ey0/  j,41$K1

    t=(tl !"#)

    • Te operations encryption or asing 5diffusion and

    left circular sift are performed$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    10/33

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    11/33

    Packets

    ,ey generation

    , 1t 2F3tl4*56

    Encryption 4 Difusion an% shi(t

    State(ul #o%e

    Dyna#ic key

    T-ME &'"ED /E2 M'*'(EME*T MOD67E

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    12/33

    RP"/ )/D0'E

    • "ecurity part of "TEM wic uses 'R)8

    algoritm$

    •/eys from T/M module is verified ere and sent

     bac! to T/M if te !ey received is wrong$

    • 9 Operational Modes used in te algoritm$ *o reEnc+ull reEnc"elective reEnc

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    13/33

    )R2PTO MOD67E

    Dyna#ic ,ey

     ",) )o%ule

    5eri(y

    R! Algorith#

    /perational )o%es

    Packets &ith ,ey

    7rong key

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    14/33

    F*'"ER*N. AND F/R7ARD*N.SNHR/N*8A"*/N )/D0'E

    • -t filters te incoming pac!ets5 removes te bad

     pac!et from te networ!$

    •Te forwarder node5 first syncroni#e

    temselves and ten forward te report$

    •Te advantage is only one value is trac!ed$

    • -t can properly order any report from any

    source in te networ! using : values$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    15/33

    Selective Re-Encryption )o%ule

    •Re,encryption at different ops along te data

    delivery pat to te sin!$

    •Transmission costs and total energy consumptionare identified$

    •Tird5 +ift and sevent nodes are re,encrypted$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    16/33

    Analysis o( Attackers9

    •Te outside malicious node will be able to

    inject a false pac!et$

    •)lassified based on te eavesdropping of

    messages•)lassified attac!ers are

    4$"ensor,class attac!ers

    ;$Middle,class attac!ers9$Powerful attac!ers

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    17/33

    System Re"uireme#ts

    'anguage : ;A5A "ool : NE" +EANS *DEData$ase : ) S

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    18/33

    C$#c%usi$#

    •.e relaxed te perfect syncroni#ationcondition for ."*$

    •.e focused on minimi#ing te

    communication in te networ!$•.e ave been able to acieve our main goal

    of syncroni#ing events at a sin! as quic!ly5

    accurately and surreptitiously as possible$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    19/33

    Future E#hceme#t

    •"tudying furter more opportunities for

    increasing te cloc! precision$

    •/ey trials usage can furter be reduced$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    20/33

    Re'ere#ces

    •  "$R$ +lurer5 -$ Mantin5 and '$ "amir5 l .or!sop

    "elected 'reas in )ryptograpy 0"')15pp$ 4,;85;??4$•

    '$ 6luagac5 R$ &eya5 2$ 7i5 and @$ )opeland5

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    21/33

    "in! and *odes (eneration

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    22/33

     *ode "election

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    23/33

    Pat "election

    i

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    24/33

    /ey (eneration

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    25/33

    Encryption

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    26/33

    )rypto Module, correct !ey

    ) M d l !

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    27/33

    )rypto Module,wrong !ey

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    28/33

    -ncoming Pac!et Reporting

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    29/33

    -ncoming Pac!et to "-*/ 

    " d * d -d tifi ti

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    30/33

    "ource and *odes -dentification

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    31/33

    Pat of Pac!et Delivery

    T-)/ .i d

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    32/33

    T-)/ .indow

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    33/33

    (rap O6TP6T