secure synchronization with trust evaluation model (stem) for wireless sensor networks
TRANSCRIPT
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
1/33
Secure Synchronization with
Trust Evaluation Model (STEM)for Wireless Sensor Networks
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
2/33
INDEX
•Objective
•Existing system
• Proposed system
•Dataflow Diagram
•Modules description
•Requirements
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
3/33
OBJECTIVE
•To obtain ealty pac!ets by "yncroni#ing
events and increasing te cloc! precision
wit energy saving for addressing te inside
treats$
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
4/33
EXISTING SYSTEM
• "ecure "yncroni#ation$
•%ig energy consumption$
• "O&'" is better only wen oter similar
scemes do not employ (P" devices$
•)loc! precision can still be reduced$
• *o attac!ers analysis is available$
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
5/33
PROPOSED SYSTEM
• +ilter te malicious data by using Dynamic En,route
filtering mecanism$
• To save energy communication in te networ! is
minimi#ed$
• -t provides more cloc! precision tan te existing
system$
• .itout explicit syncroni#ation control messages it
syncroni#e te events in te networ!$• 'ddresses attac!ers in te networ!$
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
6/33
System Architecture
TKM Module
Encryption orHashing
Difuser
CRYPTO Module
No-ReEnc
Full- ReEnc
Selective-ReEnc
Filtering andForwarding
Module
Full Path
Synchronization
Partial Path
Synchronization
Packets
AR!
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
7/33
DATA FLO
DIAGRAM
Packets
"i#e $ase% key
#anage#ent
#o%ule
rypto
#o%ule
Filter %ata For&ar% %ata
'oose
synchronization
Selective reEnc Full reEncNo reEnc
Analysis o( outsi%er
attackers
A%%ressing insi%e
threats
Healthy Packets
)alicious no%e
analysis
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
8/33
MOD!LES
Time &ased /ey Management 0T/M1
Module$
)R2PTO Module$+iltering 'nd +orwarding "yncroni#ation
0++"1 Module$
"elective Re,Encryption Module$
'nalysis of 'ttac!ers$
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
9/33
"*)E +ASE ,E )ANA.E)EN" )/D0'E
• /eys are generated dynamically using local time0localcloc! value1$
• /eys are a function of te current local time value 0tl1
and eiter an -nitiali#ation vector0-31 or previous
!ey0/ j,41$K1
t=(tl !"#)
• Te operations encryption or asing 5diffusion and
left circular sift are performed$
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
10/33
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
11/33
Packets
,ey generation
, 1t 2F3tl4*56
Encryption 4 Difusion an% shi(t
State(ul #o%e
Dyna#ic key
T-ME &'"ED /E2 M'*'(EME*T MOD67E
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
12/33
RP"/ )/D0'E
• "ecurity part of "TEM wic uses 'R)8
algoritm$
•/eys from T/M module is verified ere and sent
bac! to T/M if te !ey received is wrong$
• 9 Operational Modes used in te algoritm$ *o reEnc+ull reEnc"elective reEnc
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
13/33
)R2PTO MOD67E
Dyna#ic ,ey
",) )o%ule
5eri(y
R! Algorith#
/perational )o%es
Packets &ith ,ey
7rong key
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
14/33
F*'"ER*N. AND F/R7ARD*N.SNHR/N*8A"*/N )/D0'E
• -t filters te incoming pac!ets5 removes te bad
pac!et from te networ!$
•Te forwarder node5 first syncroni#e
temselves and ten forward te report$
•Te advantage is only one value is trac!ed$
• -t can properly order any report from any
source in te networ! using : values$
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
15/33
Selective Re-Encryption )o%ule
•Re,encryption at different ops along te data
delivery pat to te sin!$
•Transmission costs and total energy consumptionare identified$
•Tird5 +ift and sevent nodes are re,encrypted$
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
16/33
Analysis o( Attackers9
•Te outside malicious node will be able to
inject a false pac!et$
•)lassified based on te eavesdropping of
messages•)lassified attac!ers are
4$"ensor,class attac!ers
;$Middle,class attac!ers9$Powerful attac!ers
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
17/33
System Re"uireme#ts
'anguage : ;A5A "ool : NE" +EANS *DEData$ase : ) S
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
18/33
C$#c%usi$#
•.e relaxed te perfect syncroni#ationcondition for ."*$
•.e focused on minimi#ing te
communication in te networ!$•.e ave been able to acieve our main goal
of syncroni#ing events at a sin! as quic!ly5
accurately and surreptitiously as possible$
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
19/33
Future E#hceme#t
•"tudying furter more opportunities for
increasing te cloc! precision$
•/ey trials usage can furter be reduced$
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
20/33
Re'ere#ces
• "$R$ +lurer5 -$ Mantin5 and '$ "amir5 l .or!sop
"elected 'reas in )ryptograpy 0"')15pp$ 4,;85;??4$•
'$ 6luagac5 R$ &eya5 2$ 7i5 and @$ )opeland5
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
21/33
"in! and *odes (eneration
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
22/33
*ode "election
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
23/33
Pat "election
i
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
24/33
/ey (eneration
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
25/33
Encryption
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
26/33
)rypto Module, correct !ey
) M d l !
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
27/33
)rypto Module,wrong !ey
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
28/33
-ncoming Pac!et Reporting
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
29/33
-ncoming Pac!et to "-*/
" d * d -d tifi ti
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
30/33
"ource and *odes -dentification
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
31/33
Pat of Pac!et Delivery
T-)/ .i d
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
32/33
T-)/ .indow
-
8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks
33/33
(rap O6TP6T