Wireless sensor network (WSN) is an emerging imperious leading technology of the current century that presents great promise for various pioneering applications. The use of sensor networks should keep developing, mainly in the fields of scientific, logistic, healthcare and military applications. Sensor networks interact and collect sensitive data and operate in unattended hostile environments, thus it is imperative to pay attention to the security of wireless sensor networks as they are highly prone to threats. For successful operation of the nodes, it is important to maintain the security and privacy of the transmitted data as well as the data stored at nodes.
The different security protocols and models used in the wired and other wireless networks such as ad-hoc networks cannot be used in WSNs because the sensor size poses significant restrictions, mainly in terms of energy autonomy and node lifetime, as the batteries have to be too tiny. Also, the existing security protocols in these constrained networks are not sufficiently energy efficient, which is the real motivation behind this work. In this thesis, a light-weight dynamic security algorithm titled “An Energy Efficient and Dynamic Security Protocol (EEDSP)” for wireless sensor networks has been proposed and implemented at nodal level. We also implement an existing algorithm and then carry out the performance analysis of both the algorithms in terms of energy consumptions, node lifetime and memory requirements at source and intermediate nodes to verify the improvement in our protocol’s results.
Table of Contents
1. Introduction
1.1 Network Components of WSN
1.1.1 Sensor Node and its Functional Units
1.1.2 Base Station (Sink)
1.2 Sensor Network Requirements
1.3 WSN Operation
1.3.1 Communication Model
1.4 Performance limits of WSN
1.5 Classification of Sensors
1.5.1 Active Sensors
1.5.2 Passive, Directional Sensors
1.5.3 Narrow Beam Sensors (Passive)
1.6 Classification of Sensor Network Applications
1.6.1 Event Detection and Reporting
1.6.2 Data Gathering and Periodic Reporting
1.6.3 Sink-Initiated Querying
1.6.4 Tracking Based Application
1.7 Motivation of the Work
1.8 Thesis Outline
2. Literature Survey & Problem Statement
2.1 Existing Security Protocols
2.1.1 Secure Information Aggregation: SIA [25]
2.1.2 On Scalable security model
2.1.3 MAC Protocol
2.1.4 TinySec
2.1.5 Localized Encryption and Authentication Protocol (LEAP)
2.1.6 Neighborhood based Key Agreement Protocol (NEKAP)
2.1.7 MiniSec
2.1.8 Secure Data Aggregation Protocol (SDAP)
2.1.9 SPINS
2.1.10 Key predistribution schemes
2.1.11 Dynamic cryptographic algorithm [44]
2.1.12 Hierarchical key management
2.2 Conclusion of literature survey
2.3 Problem Statement
2.4 Objectives
3. Security in WSN
3.1 Security Issues in Wireless Sensor Networks
3.2 Why Sensor Networks Are Difficult to Protect
3.3 Security Challenges and Design Issues in WSN
3.3.1 Node Deployment
3.3.2 Transmission Media
3.3.3 Connectivity
3.3.4 Coverage
3.3.5 Fault tolerance
3.3.6 Scalability
3.3.7 Data Aggregation
3.3.8 Quality of Service
3.4 Security Considerations
3.4.1 Confidentiality
3.4.2 Integrity
3.4.3 Authentication
3.4.4 Availability
3.5 Security Classes
3.6 Attacks on Sensor Networks
3.6.1 Passive Attacks
3.6.1.1 Attacks against Privacy
3.6.2 Active Attacks
3.6.2.1 Routing Attacks in Sensor Networks
3.6.2.2 Denial of Service
3.6.2.3 Node Replication Attacks
3.7 Security Objectives
3.7.1 Insecure Delivery
3.7.2 Secure Delivery
3.7.3 Network Life Time
4. Proposed Method
4.1 Concept
4.2 Assumptions
4.3 Application Scenario
4.4 Algorithm for encrypting the sensed data
4.5 Time period calculation
4.6 Energy consumption calculation
5. Simulation and Results
5.1 Analysis Activity
5.2 Simulation
5.3 Simulation Setup
5.4 Results and comparisons with existing methods
5.4.1 Energy consumption per encryption
5.4.2 Energy consumption per decryption
5.4.3 Total Energy Vs Number of continuous transmissions at source node
5.4.4 Total Energy Vs Number of continuous transreceptions at intermediate node
5.4.5 Total Energy Vs Lifetime
5.4. Space complexity of algorithms
5.5 Discussion
6. Conclusion & Future Scope
6.1 Conclusion
6.2 Future Scope
Research Objectives & Key Topics
The research primarily aims to identify the security and performance challenges within wireless sensor networks (WSNs) and to propose a novel, energy-efficient security algorithm that prolongs network lifetime while maintaining robust security against common cryptanalytic attacks. The study focuses on balancing the trade-off between cryptographic security and the resource-constrained nature of sensor nodes.
- Energy efficiency in security protocols for resource-constrained WSNs.
- Development of a dynamic key-based security algorithm using XOR operations.
- Comparative performance analysis of the proposed algorithm versus existing protocols.
- Security considerations in WSN, including confidentiality, integrity, authentication, and availability.
- Modeling and simulation of network lifetime and energy consumption under different security schemes.
Excerpt from the Book
1.1 Network Components of WSN
The main components of a general WSN are the sensor nodes, the sink (base station) and the events being monitored.
1.1.1 Sensor Node and its Functional Units
In WSN, every sensor node has capabilities of sensing, processing and communicating data to the required destination. The basic entities in sensor nodes are sensing unit, power unit, processing unit, communication unit and memory unit to perform these operations shown in Figure 1.2 below.
i) Sensing Unit
Sensors play an important role in sensor networks by creating a connection between physical world and computation world. Sensor is a hardware device used to measure the change in physical condition of an area of interest and produce response to that change. Sensors sense the environment, collect data and convert it to fundamental data (current or voltage etc) before sending it for further processing. It converts the analogue data (sensed data from an environment) to digital data and then sends it to the microcontroller for further processing. There are different categories of sensors which are available and can be used depending on the nature of the intended operation.
Summary of Chapters
1. Introduction: Provides an overview of wireless sensor network technology, its core components, operating models, classification, and the motivation for developing new security protocols.
2. Literature Survey & Problem Statement: Reviews existing security protocols for WSNs, identifies their limitations regarding energy consumption and security, and defines the research objectives.
3. Security in WSN: Analyzes the unique security requirements, threats, and design challenges specifically related to wireless sensor networks in hostile environments.
4. Proposed Method: Details the conceptual design and implementation of a new energy-efficient, dynamic-key based security algorithm intended to safeguard sensor data.
5. Simulation and Results: Presents the platform, methodology, and performance outcomes of the proposed algorithm compared to existing models, focusing on energy metrics and lifetime.
6. Conclusion & Future Scope: Summarizes the research findings regarding efficiency and security improvements and proposes directions for future enhancements in cryptographic techniques.
Keywords
Wireless Sensor Networks, WSN, Security Protocol, Energy Efficiency, Data Aggregation, Dynamic Key, Network Lifetime, Cryptography, Node Authentication, DoS Attack, Symmetric Encryption, Resource-constrained, Sensor Nodes, Simulation, Performance Metrics
Frequently Asked Questions
What is the primary focus of this research?
The research focuses on addressing the trade-off between energy consumption and security in wireless sensor networks by developing a novel, energy-efficient security algorithm.
What are the core themes addressed in this book?
The core themes include the design of secure, low-overhead cryptographic algorithms for WSNs, energy optimization, performance analysis through simulation, and mitigating security threats such as node tampering and routing attacks.
What is the central research question?
The research aims to determine how to implement a secure encryption mechanism for resource-constrained WSNs that minimizes energy expenditure and maximizes the operational lifetime of sensor nodes.
Which scientific method is utilized in this work?
The author uses a comparative methodology: implementing an existing security protocol and a new proposed protocol, then running simulations to analyze performance metrics like energy consumption, memory requirements, and network lifetime.
What is covered in the main section of the book?
The main sections cover a literature review of current security protocols, an analysis of WSN-specific security issues, the technical design of the proposed method, and detailed simulation results evaluating the algorithm's performance.
Which keywords best characterize this work?
Key terms include Wireless Sensor Networks (WSN), energy efficiency, security protocol, network lifetime, and dynamic encryption.
How does the proposed algorithm maintain security with simple XOR operations?
The security is maintained not through complex computation, but through the periodic changing of the encryption key, which makes it cryptographically robust against brute-force attacks.
Why is traditional network security unsuitable for WSNs?
Traditional security mechanisms (like IPSec or SSL) are designed for environments with sufficient power and memory, whereas WSNs are resource-constrained and have unique operational requirements that make these protocols impractical.
What is the role of the "unscathed time warp" in the proposed method?
It refers to the negligible time period during which the data is decrypted and re-encrypted with a new key, ensuring that information remains secure even during the transition of encryption keys.
- Citar trabajo
- Adil Bashir (Autor), Ajaz Hussain Mir (Autor), 2013, An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks, Múnich, GRIN Verlag, https://www.grin.com/document/1034746