Implementation of RSA Security Protocol for Sensor NetworkSecurity

download Implementation of RSA Security Protocol for Sensor NetworkSecurity

of 8

Transcript of Implementation of RSA Security Protocol for Sensor NetworkSecurity

  • 8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity

    1/8

  • 8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity

    2/8

    Implementation of RSA Security Protocol for Sensor

    NetworkSecurity: Design and Network Lifetime AnalysisObjective

    In sensor network, source nodes after sensing data forwards to their next hop. There exists different

    sensor topology. Data gathering nodes can be either sink or another sensor node. Considering thatdata is forwarded to base station through intermediate sensors, it is essential to protect the data

    from evasdropping. In wireless technology a node can change it's MAC address and can pretend to

    be one of the dorwarding nodes of a sensor . In such scenario, these attacker nodes can easily READ

    the data destined for another node. In order to prevent such data licking, sensor network must

    adopt critical cryptographic techniques. But pair wise cryptography needs a node to encrypt the data

    and next hop to decrypt it. As sensors sends their data mainly through flooding or selective

    broadcast, encryption and decryption process in every hop and in every packet adds tremendeous

    overhead and hence nodes looses their energy fast.

    In order to avoid such overhead objective should be to decrease number of encryption anddecryption. Hence we propose a technique where nodes are divided into clusters. every cluster has

    it's own public key and every nodes have their private keys. Public key of every cluster is sent to base

    station over secured communication.

    Nodes encrypts their data using their private key. No node in next hop decrypts it. They forward to

    clusterhead and cluster head further forwards it to base station along with appending cluster ID . as

    base station stores every cluster's public key, it can easily decrypt the message.

    Statement of the Problem

    Existing secured sensor network adopts pair-based encryption which results in very high energy

    consumption. Therefore in this work we propose a unique technique of first clustering the network

    and then encrypting the data only in source nodes. Every clusterhead appends cluster ID in the

    packets before sending them to base station. In base stations packets are decrypted with the public

    key of the particular clusters. Cluster selection is made to be a time stamp basis. Hence cluster heads

    are changed periodically and also the public key thus reducing chances of brute force prediction by

    attacker node.

  • 8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity

    3/8

    Implementation of RSA Security Protocol for Sensor

    NetworkSecurity: Design and Network Lifetime AnalysisSystem Design

    Security Block Diagram

    Encryption Decryption System

  • 8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity

    4/8

    Implementation of RSA Security Protocol for Sensor

    NetworkSecurity: Design and Network Lifetime AnalysisCluster Head Based Topology

    RSA Algorithm

  • 8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity

    5/8

    Implementation of RSA Security Protocol for Sensor

    NetworkSecurity: Design and Network Lifetime Analysis

    Algorithm

    Encryption:

    Encryption is done using the public key component e and the modulus n. To whomever we need to

    send the message, we encrypt the message with their public key (e,n). Encryption is done by taking

    an exponentiation of the message m with the public key e and then taking a modulus of it. The

    following steps are done in encryption.

  • 8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity

    6/8

    Implementation of RSA Security Protocol for Sensor

    NetworkSecurity: Design and Network Lifetime Analysis1. Obtain the recipients public key (n,e)

    2. Represent the plaintext message as a positive integer m < n

    3. Compute the ciphertext c = m^e

    mod n.

    4. Send the ciphertext c to the recipient.

    Decryption:

    Decryption is done using the Private key. The person who is receiving the encrypted message

    uses his own private key to decrypt the message. Decryption is similar to the encryption

    except that the keys used are different.

    1. Recipient uses his private key (n,d) to compute m = c^d

    mod n.

    2. Extract the plaintext from the integer representative m.

    The RSA algorithm has been implemented in many applications and it is currently one of the

    most popularly used encryption algorithm. RSA algorithm is based fully on mathematics and

    in the next section we will see the mathematics behind RSA.

    Communication Hierarchy

  • 8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity

    7/8

    Implementation of RSA Security Protocol for Sensor

    NetworkSecurity: Design and Network Lifetime Analysis

  • 8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity

    8/8

    Implementation of RSA Security Protocol for Sensor

    NetworkSecurity: Design and Network Lifetime AnalysisImplementation