Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

download Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

of 33

Transcript of Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    1/33

    Secure Synchronization with

    Trust Evaluation Model (STEM)for Wireless Sensor Networks

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    2/33

    INDEX

    •Objective

    •Existing system

    • Proposed system

    •Dataflow Diagram

    •Modules description

    •Requirements

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    3/33

    OBJECTIVE

    •To obtain ealty pac!ets by "yncroni#ing

    events and increasing te cloc! precision

    wit energy saving for addressing te inside

    treats$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    4/33

    EXISTING SYSTEM

    • "ecure "yncroni#ation$

    •%ig energy consumption$

    • "O&'" is better only wen oter similar

    scemes do not employ (P" devices$

    •)loc! precision can still be reduced$

    • *o attac!ers analysis is available$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    5/33

    PROPOSED SYSTEM

    • +ilter te malicious data by using Dynamic En,route

    filtering mecanism$

    • To save energy communication in te networ! is

    minimi#ed$

    • -t provides more cloc! precision tan te existing

    system$

    • .itout explicit syncroni#ation control messages it

    syncroni#e te events in te networ!$• 'ddresses attac!ers in te networ!$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    6/33

    System Architecture

     

    TKM Module

    Encryption orHashing

    Difuser

     

    CRYPTO Module 

    No-ReEnc

    Full- ReEnc

    Selective-ReEnc

    Filtering andForwarding

    Module

    Full Path

    Synchronization

    Partial Path

    Synchronization

    Packets

    AR!

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    7/33

    DATA FLO

    DIAGRAM

    Packets

     "i#e $ase% key

    #anage#ent

    #o%ule

    rypto

    #o%ule

    Filter %ata For&ar% %ata

    'oose

    synchronization

    Selective reEnc Full reEncNo reEnc

    Analysis o( outsi%er

    attackers

    A%%ressing insi%e

    threats

    Healthy Packets

    )alicious no%e

    analysis

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    8/33

    MOD!LES

    Time &ased /ey Management 0T/M1

    Module$

    )R2PTO Module$+iltering 'nd +orwarding "yncroni#ation

    0++"1 Module$

    "elective Re,Encryption Module$

    'nalysis of 'ttac!ers$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    9/33

     "*)E +ASE ,E )ANA.E)EN" )/D0'E

    • /eys are generated dynamically using local time0localcloc! value1$

    • /eys are a function of te current local time value 0tl1

    and eiter an -nitiali#ation vector0-31 or previous

    !ey0/  j,41$K1

    t=(tl !"#)

    • Te operations encryption or asing 5diffusion and

    left circular sift are performed$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    10/33

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    11/33

    Packets

    ,ey generation

    , 1t 2F3tl4*56

    Encryption 4 Difusion an% shi(t

    State(ul #o%e

    Dyna#ic key

    T-ME &'"ED /E2 M'*'(EME*T MOD67E

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    12/33

    RP"/ )/D0'E

    • "ecurity part of "TEM wic uses 'R)8

    algoritm$

    •/eys from T/M module is verified ere and sent

     bac! to T/M if te !ey received is wrong$

    • 9 Operational Modes used in te algoritm$ *o reEnc+ull reEnc"elective reEnc

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    13/33

    )R2PTO MOD67E

    Dyna#ic ,ey

     ",) )o%ule

    5eri(y

    R! Algorith#

    /perational )o%es

    Packets &ith ,ey

    7rong key

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    14/33

    F*'"ER*N. AND F/R7ARD*N.SNHR/N*8A"*/N )/D0'E

    • -t filters te incoming pac!ets5 removes te bad

     pac!et from te networ!$

    •Te forwarder node5 first syncroni#e

    temselves and ten forward te report$

    •Te advantage is only one value is trac!ed$

    • -t can properly order any report from any

    source in te networ! using : values$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    15/33

    Selective Re-Encryption )o%ule

    •Re,encryption at different ops along te data

    delivery pat to te sin!$

    •Transmission costs and total energy consumptionare identified$

    •Tird5 +ift and sevent nodes are re,encrypted$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    16/33

    Analysis o( Attackers9

    •Te outside malicious node will be able to

    inject a false pac!et$

    •)lassified based on te eavesdropping of

    messages•)lassified attac!ers are

    4$"ensor,class attac!ers

    ;$Middle,class attac!ers9$Powerful attac!ers

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    17/33

    System Re"uireme#ts

    'anguage : ;A5A "ool : NE" +EANS *DEData$ase : ) S

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    18/33

    C$#c%usi$#

    •.e relaxed te perfect syncroni#ationcondition for ."*$

    •.e focused on minimi#ing te

    communication in te networ!$•.e ave been able to acieve our main goal

    of syncroni#ing events at a sin! as quic!ly5

    accurately and surreptitiously as possible$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    19/33

    Future E#hceme#t

    •"tudying furter more opportunities for

    increasing te cloc! precision$

    •/ey trials usage can furter be reduced$

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    20/33

    Re'ere#ces

    •  "$R$ +lurer5 -$ Mantin5 and '$ "amir5 l .or!sop

    "elected 'reas in )ryptograpy 0"')15pp$ 4,;85;??4$•

    '$ 6luagac5 R$ &eya5 2$ 7i5 and @$ )opeland5

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    21/33

    "in! and *odes (eneration

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    22/33

     *ode "election

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    23/33

    Pat "election

    i

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    24/33

    /ey (eneration

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    25/33

    Encryption

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    26/33

    )rypto Module, correct !ey

    ) M d l !

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    27/33

    )rypto Module,wrong !ey

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    28/33

    -ncoming Pac!et Reporting

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    29/33

    -ncoming Pac!et to "-*/ 

    " d * d -d tifi ti

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    30/33

    "ource and *odes -dentification

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    31/33

    Pat of Pac!et Delivery

    T-)/ .i d

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    32/33

    T-)/ .indow

  • 8/18/2019 Secure Synchronization With Trust Evaluation Model (STEM) for Wireless Sensor Networks

    33/33

    (rap O6TP6T