Professional Documents
Culture Documents
\
|
|
|
.
|
\
|
|
|
.
|
\
|
|
|
.
|
\
|
=
s
s
s
s
s
K
S
K
K
K
S
P
The probability P
sa
where a stationary access node and
sensor nodeshares a static key is,
P
sa
=1-
|
|
.
|
\
|
|
|
.
|
\
|
|
|
.
|
\
|
|
|
.
|
\
|
|
|
.
|
\
|
|
|
.
|
\
|
1
1
1 2
1 2
s s
s
s
s
K
S
K
S
K
K
K
S
As stated in the previous section, for an attacker
to launch a mobilesink replication attack on the network,
the adversary has to compromise at least one polynomial
from the mobile polynomial pool. To achieve this, the
adversary must capture atleast a specific number of
stationary access nodes that hold the same mobile
polynomial. To estimate the probability Pr of a mobile
polynomial being compromised, we consider thecaptureof
sensor nodes is independent. Now let w be a polynomial in
the mobile pool. Theprobability of w being chosen for a
stationary access node is 1/|M|, and theprobability that any
captured node is a stationary access node is m/n, and the
probability that a captured nodeis a stationary access node
and it hold w is 1/|M| X m/n. Therefore, theprobability that
this polynomial being chosen exactly by x stationary
access nodes among R
c
captured nodes (R
c
>t
m
wheret
m
is
the degree of polynomial w) is
) ( ^
1
1 ^
1
) ( x R
n
m
M
x
n
m
M x
R
x P c
c
|
|
.
|
\
|
|
|
.
|
\
|
|
|
.
|
\
|
=
Thus, theprobability that any polynomial from the mobile
pool being recovered by an attacker is
=
=
tm
x
x P
0
) ( 1 Pr
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 6June 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page 1838
Even though, the nodes are compromised, the
detection algorithm provides good security against replica
nodes. The implementation of thedetection algorithm does
not increase the communication cost. The detection
algorithm may be compromised if the attacker is very close
to the compromised node. This paper is stimulated in NS-2
and experimental results are shown below.
Fig 3. Mobile sink (patrol) detects replica nodes.
Through analysis, we studied that the
implementation of the detection algorithm in the
framework gives more security, throughput, less delay than
using only three layers in thearchitecture.
Fig 4 shows the comparison of the architecture
with and without the implementation detection algorithm in
it.
Fig 4. Thegreen graph shows that thedetection algorithm
has high throughput.
Fig 5. The green graph shows the detection algorithm has
less delay.
V. Conclusion
Our paper three mode security framework
proposed an optimal approach for authentication and
pairwise key predistribution for a distributed wireless
sensor networks. This architectureprovides high security to
the network against replica attacks on mobile sink and
stationary access nodes. Through analysis, we conclude
that this approach provides nearly 70 percent detection
against replica attacks and wormhole attacks. We are in
future work to extend the security of this paper to avoid
node capturing.
REFERENCES
[1] I.F. Akyildiz,W. Su, Y. Sankarasubramaniam, and
E.Cayirci,Wireless Sensor Networks: A Survey,
Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
[2] .LEschenauer and V.D.Gligor, A Key-Management
SchemeFor Distributed Sensor Networks ,Proc. ACM
Conf. Computer Comm.Security (CCS 02), pp. 41-47,
2002.
[3] H. Chan, A. Perrig, and D. Song, Random Key Pre-
Distribution Schemes for Sensor Networks, Proc.
IEEE Symp. Research in Security and Privacy, 2003.
[4] D. Liu, P. Ning, and R.Li. Establishing, Pairwise Keys
in Distributed Sensor Networks, Proc. 10th ACM
Conf. Computers and Comm. Security (CCS 03), pp.
52-61, Oct. 2003.
[5] H.Chan,A. Perrig, and D. Song, Key Distribution
Techniques for Sensor Networks, Wireless Sensor
Networks, pp. 277-303, Kluwer Academic, 2004.
[6] D. Liu and P. Ning, Location-Based Pairwise Key
Establishments for Static Sensor Networks, Proc. First
ACM Workshop Security AdHoc and Sensor Networks,
2003.
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 6June 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page 1839
[7] S. Zhu, S. Setia, and S. J ajodia, LEAP: Efficient
Security Mechanisms for Large-ScaleDistributed
Sensor Networks, Proc.10th ACM Conf. Computers
and Comm. Security (CCS 03), pp. 62-72,Oct. 2003.
[8] A. Rasheed and R. Mahapatra, An Efficient Key
Distribution Scheme for Establishing PairwiseKeys
with a Mobile Sink in Distributed Sensor Networks,
Proc. IEEE 27th Intl Performance Computing and
Comm. Conf. (IPCCC 08), pp. 264-270, Dec. 2008.
[9].A. Rasheed and R. Mahapatra, A Key Pre-Distribution
Schemefor Heterogeneous Sensor Networks, Proc.
Intl Conf. Wireless Comm. and Mobile Computing
Conf.(IWCMC 09), pp. 263-268,June2009.
[10].L. Lamport, Password Authentication with Insecure
Communication, Comm. ACM, vol, 24, no. 11, pp.
770- 772, Nov. 1981
.
[11] C. Blundo, A. DeSantis, A. Herzberg, S. Kutten, U.
Vaccaro, and M. Yung, Perfectly-SecureKey
Distribution for Dynamic Conferences,Proc. 12th
Ann. Intl Crryptology Conf. Advances in Cryptology
(CRYPTO 92), pp. 471-486, 1993.
[12] Zahariadis,T Leligou, H.C. Trakadas,P. Voliotis S.
Trust management in wireless sensor networks. Eur.
Trans. Telecommun. 2010, 21, 1-10.
[13]. Zhang, Q.; Yu, T.; Ning, P. A framework for
identifying compromised nodes in wireless sensor
networks. ACM Trans. Inform. Syst. 2008, 11, 1-37.
[14].Shaikh, R.A.; J ameel, H.; Auriol, B.J.;Lee, H.; Lee, S.;
Song. Y.J. Intrusion- awarealert validation algorithm
for cooperativedistributed intrusion detection
schemes of wireless sensor networks Sensors 2009,
9, 5989-6007.
[15].Parno, B.; Perrig, A.; Gligor, V.D. Distributed
detection of node replication attacks in sensor
networks. In Proceedings of IEEE S&P, Oakland,
CA, USA, 811 May 2005; pp. 49-63.
[16].Ho, J .W.; Wright, M.; Das, S.K,Fast detection of
replica node attacks in mobile sensor networks using
sequential analysis. In Proceedings of IEEE
INFOCOM, Rio de J aneiro, Brazil, 1925 April 2009;
pp. 1773-1781.
[17].Ho, J .W.; Liu, D.; Wright, M.; Das, S.K. Distributed
detection of replica nodeattacks with group
deployment knowledge in wireless sensor networks.
Ad Hoc Network. 2009, 7, 1476-1488.
[18].Pietro, R.D. Oligeri,G, Soriente,C.Tsudik,G.
Intrusion resiliencein mobile unattended WSNs. In
Proceedings of INFOCOM, San Diego, CA, USA,
1419 March 2010; pp. 1-9.
[19].Mariano.G.Zahariadis, T.lvarez, F.Leligou,
H.C.Adrin,P.H.Karkazis,P.Francisco,J.C.Secure
geographic routing in ad-hoc and wireless sensor
networks.URASIP J. Wirel. Comm. 2010, 975607, 1-
1