Content of smart wireless sensor network security and its network security policy



Similar documents
About the Authors Preface Acknowledgements List of Acronyms

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

An Intelligent Car Park Management System based on Wireless Sensor Networks

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Securing MANET Using Diffie Hellman Digital Signature Scheme

Design of Remote data acquisition system based on Internet of Things

Development of cloud computing system based on wireless sensor network protocol and routing

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

SPINS: Security Protocols for Sensor Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

CHAPTER 1 INTRODUCTION

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

Chapter 1: Introduction

A Network Simulation Experiment of WAN Based on OPNET

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

A Proxy-Based Data Security Solution in Mobile Cloud

SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN

A Design of Greenhouse Remote Monitoring System Based on WSN and WEB

A Catechistic Method for Traffic Pattern Discovery in MANET

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Wireless Sensor Network: Challenges, Issues and Research

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Research on Operation Management under the Environment of Cloud Computing Data Center

Depiction of Body Area Network in Cloud Environment

Customer Specific Wireless Network Solutions Based on Standard IEEE

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

End-to-end Secure Data Aggregation in Wireless Sensor Networks

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Problems of Security in Ad Hoc Sensor Network

Fault Analysis in Software with the Data Interaction of Classes

Demystifying Wireless for Real-World Measurement Applications

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Wireless Sensor Networks Chapter 14: Security in WSNs

A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

CRYPTOGRAPHY IN NETWORK SECURITY

Secure Routing in Wireless Sensor Networks

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

A REMOTE HOME SECURITY SYSTEM BASED ON WIRELESS SENSOR NETWORK AND GSM TECHNOLOGY

Security Sensor Network. Biswajit panja

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS


Efficient Data Transmission For Wireless Sensor Networks

A Security Architecture for. Wireless Sensor Networks Environmental

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

White Paper. Enhancing Website Security with Algorithm Agility

Original Research Articles

NanoMon: An Adaptable Sensor Network Monitoring Software

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Single Sign-On Secure Authentication Password Mechanism

CPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD

Remote Home Security System Based on Wireless Sensor Network Using NS2

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation

A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks

A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTERING AND KEYING TECHNIQUES

Application of Data Mining Techniques in Intrusion Detection

Big Data Storage Architecture Design in Cloud Computing

Wireless Sensor Network Based Low Power Embedded System Design For Automated Irrigation System Using MSP430

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

Wireless Sensor Network: Improving the Network Energy Consumption

The design and implementation of the environment monitoring system of smart home based on EnOcean technology

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): Research Article

The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a

Content Teaching Academy at James Madison University

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

The Interoperability of Wireless Sensor Networks

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

An Optimization Model of Load Balancing in P2P SIP Architecture

TOPOLOGIES NETWORK SECURITY SERVICES

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Constructing High Quality IP Core Network

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Mobile and Sensor Systems

Transcription:

Abstract Content of smart wireless sensor network security and its network security policy Xiehua Yu Minnan Science and Technology Institute, Fujian Normal University, Fujian, 362332, China eceived 1 October 2014, www.cmnt.lv Wireless sensor network is generally composed by plenty of micro-sensors that arranged on designated area. The supervision of these sensor nodes is used to finish the collecting, disposing and uploading of vast inform. However, the security of wireless sensor network has many problems, since the sensor node itself exists plenty of limit. Aiming at the problems of smart wireless sensor network security as well as the analysis of wireless sensor network node easy been attacked, wiretapped and forged without safeguard, this paper put forward a security policy of smart wireless sensor network. Simple and useful intrusion detection policy was realized from a series of improvement of LEACH protocol of low-energy self-adapt cluster routing protocol. Keywords: smart wireless sensor network security, secure routing, key management, intrusion detection 1 Introduction According to characteristics of limited self resource, poor computing power and small storage space of wireless sensor network, this paper put forward a security policy of smart wireless sensor network. Through the improvement of LEACH protocol of low-energy self-adapt cluster routing protocol, and the requirement of low-energy and real-time needed for intrusion detection of wireless sensor network, it also put forward whole network cooperated intrusion detection policy. Low energy and real-time intrusion detection policy is realized by effectively using base st energy and setting up dynamic parameter. 2 Introduction of Wireless Sensor Network Wireless sensor network technology is an inter-discipline, which involves in many fields, like computer, microelectronics, sensor, network,, signal processing, etc. With the development of many relevant new technologies, this technology is also rapidly booming [1]. Sensor node is made up of data acquisition module, data processing module, data module and energy supply module [2], as shown in Figure 1. Data acquisition module is used for monitoring the collection of inform within formul range and the transform of inform data. Data processing module is used for controlling the disposal oper, routing protocol, synchroniz, loc, energy management, task management and data infusion of all nodes. Data module is used for node to collect data and transmit data. Energy supply module provides the needed energy for the above three modules. data acquisition module data processing module data processor netwo sensor AC/DC rk storage energy supply module module MAC transcei ver FIGUE 1 Architecture of sensor node Structure of wireless sensor network is shown in Figure 2 [3]. Wireless sensor network is the newly developing network, which consists of many sensors, reactors and base sts. It finishes the corresponding reaction task and distribution induction with the cooper of infinite medium. Such kind of wireless sensing actor network must be extensively used in society [4]. A B C D E Sensor node that realizes network function Sensor node Internet User FIGUE 2 Architecture of wireless sensor network system Corresponding author e-mail: yxhxieh@163.com 569 Inform and Computer Technologies

3 Contents of wireless sensor network security and its technologies 3.1 SECUE OUTING The routing algorithms of wireless sensor network are mainly put forward based on characteristics of network itself and energy problems. However, these routing algorithms are not taking security issue into consider. In order to solve problems like network failure caused by misuse of routing protocol, insecure inform transmission, etc, this paper will put forward a safe and reliable routing protocol. Generally, routing security protocol is designed from two large aspects: aspects of message encryption, intrusion detection, identity authentic, etc; the applic of multiple path transmissions for providing reliable transmission path. 3.2 KEY MANAGEMENT Based on wireless sensor key management, the authentic mechanism, confidentiality mechanism, integrity, usability, secure routing, secure localiz, etc of wireless sensor network are guaranteed. Key managements based on deployment knowledge, multipath reinforce key, random key and non-symmetric cryptography algorithm are all currently common key management plans [5]. authentic. Entity authentic refers to identify user status through method of key management. E-G algorithm and LeaP algorithm are the main representatives of authentic protocol of symmetric key, which are based on the authentic of symmetric cryptography and authentic of identity key mechanism. TinyPk authentic plan is the main representative of the authentic of identity key mechanism. µtesla protocol is the main protocol of message authentic, of which the function is the guarantee that message is not been forged or falsified [6]. 3.5 INTUSION DETECTION TECHNOLOGY Intrusion detection includes two kinds of detection models: anomaly detection and misuse detection. The process of intrusion detection is divided into three parts: inform collection, inform analysis and result processing. Wireless sensor network is subject to be larger intruded, since wireless sensor is generally located in the easily intrusive environment and resource is limited. Intrusion detection is also just emerging. The current intrusion detection technology based on active defense cannot be realized because of the characteristics of wireless sensor itself. Currently, traditional intrusion detection technology cannot apply to wireless sensor network [7]. 3.3 CYPTOLOGY The characteristic of limited energy of wireless sensor network itself will be the main problem of cryptology of wireless sensor network. Low-energy and light weight key algorithm is the characteristic of self-organizing network. More security mechanisms of wireless sensor network are designed based on the key algorithm of wireless sensor network. Many scholars are trying to effectively use public key algorithm on wireless sensor node. With the improvement of technology and the development of wireless sensor technology, the previously not utilized key algorithms begin to be widely accepted and used in wireless sensor network. 3.4 AUTHENTICATION TECHNOLOGY The authentic technology of wireless sensor network is made up of entity authentic and message 4 Security Policy of Smart Wireless Sensor Network 4.1 SECUITY POLICY MODEL OF SMAT WIELESS SENSO NETWOK Based on the relay node routing protocol of smart energy detection, this model put forward efficient group secrete protocol encryption of smart identity authentic matched with it based on cluster structure. In addition, it also added the intrusion detection plan based on smart intrusion detection recognition. This security policy model of wireless sensor network integrated the network security technology of these three aspects together, thus to make this network security policy model more comprehensive, safe and reliable. The model structure is shown in Figure 3. LEACH routing protocol improved based on smart energy inspection Smart identity authentic key protocol based on cluster structure Communic Smart intrusion detection policy based on whole network cooper Key plan Intrusion detection plan FIGUE 3 Security policy model of smart wireless sensor network 570 Inform and Computer Technologies

4.2 LEACH OUTING POTOCOL IMPOVED BASED ON SMAT ENEGY INSPECTION outing protocol of wireless sensor network is the carrier of whole network, which determines the energy consumption of wireless sensor network and security of network. The current common sensor network routing protocols are all wireless routing protocol. The characteristics of wireless sensor network are greatly different from those of wireless network, thus a more appropriate routing protocol is needed. The applic of this protocol to wireless sensor network may cause the network paralysis with exhausted energy, since LEACH routing protocol consumes large energy on cluster head node. The primarily solved problem is energy consumption that the applic of this protocol is needed. This paper put forward the improvement plan based on the routing protocol of smart energy inspection transmission relay mode. Its main content is to set up a relay node and sensor node, which locate on designated detection area. This relay node serves as transit of between cluster head node that far away from base st and base st, and it also reveal itself independently in the whole network. This protocol has a kind of smart detection mechanism, and all nodes are equipped with voltage and current detection ability (including relay node). As shown in Figure 4. 012F960F 0143 3.5V29mA 012F7D5E 0142 3.3V28mA 010D8B96 027E T=22.85 3.2V34mA FIGUE 4 Communic mode of wireless sensor elay node will detect and record data of cluster head at fixed time. When it detects that cluster head node has little energy, then it will select another node with more energy as cluster head, which will effectively solve problem of energy exhaust of cluster head node. In addition, an independent relay node is established to decrease the intrusion degree of node after been intruded. 4.3 SMAT IDENTITY AUTHENTICATION EFFICIENT GOUP KEY AGEEMENT POTOCOL MODEL BASED ON CLUSTE STUCTUE Key management protocol plays an important role in secure of sensor. It is responsible for the management task of key, for the development of wireless sensor network also needs larger guarantee for network security. In addition, the applic of group key protocol in wireless sensor network has strong reliability. The calculated amount, traffic and security of group key agreement protocol also meet the characteristics of wireless sensor network. However, the group key agreement protocol proposed by Burmester and Desmedt (or BD protocol) needs only two round of, and its calculated amount is small. BD protocol can resist passive attack brought by the wiretap of external node, but it cannot resist attack from internal node. Based on the above analysis, the applic of BD protocol in wireless sensor network is feasible. As for the characteristics of not able to resist internal node attack, this paper put forward a kind of group key agreement protocol of logical key hierarchy in hierarchical structure through the improvement of BD protocol [8]. 4.4 SMAT INTUSION DETECTION POLICY MODEL BASED ON WHOLE NETWOK COOPEATION General intrusion detection model cannot adapt to wireless sensor network, since wireless sensor network have the characteristics of small calculated amount. A da Silva, et al put forward distributed wireless sensor network intrusion detection system, which has synthesized anomaly detection and misuse detection. These two models conducted feature library contrast on attack in network and analysed abnormal data through cooperative work, then found new intrusion feature [9]. These models provided integrated intrusion detection plan, but the plan consumed more energy. Based on the improvement of distributed wireless sensor network intrusion detection model, this paper put forward the intrusion detection plan that suit to cluster wireless sensor network model. Base st implemented complex analysis and detection algorithm through each cluster head node and terminal node. The method among nodes was provided through the secure routing protocol of wireless sensor network. At the same time, a simple and lo-energy algorithm was also set up based on intrusion feature comparison for cluster head node as small-scale network rendezvous point. 4.5 OVEALL WOKING MODE OF POLICY MODEL The security policy of wireless sensor network is integrated security architecture. Taking the improved LEACH routing protocol as carrier, an inform transmission path is provided for data that need to be send through the networking and inform transmission protocol provided for routing protocol, thus to transmit inform. In the process of inform transmission for routing protocol, key agreement protocol of smart identity authentic and smart intrusion detection policy of whole network cooper were added to guarantee the security of inform transmission, which provided a low-energy security plan of secure transmission for whole inform transmission based on smart identity authentic, encryption and decryption of inform and smart intrusion detection policy of nodes. The main procedure is shown in Figure 5. 571 Inform and Computer Technologies

key policy A communi c routing protocol routing protoco l B intrusion detection policy FIGUE 5 Diagrammatic figure of the overall working mode of policy model 5 Implement of smart wireless sensor network security policy 5.1 IMPLEMENTATION OF LEACH OUTING POTOCOL IMPOVED BASED ON SMAT ENEGY INSPECTION According to the analysis and thought of routing protocol based on the relay mode of smart energy inspection, the idea in this paper was realized and verified through experiment and design. Therefore, node was considered based on routing protocol of smart detection relay node. In order to realize the protocol, we also need to provide feasible hardware and interface design plan. The component of wireless sensor are mostly made up of hardware, thus the most of applic protocols also need the support of bottom hardware. The analysis was on the need of applic layer of network, other network layer and physical layer and data link layer that supply hardware support. In addition, requirement was also analysed, since of protocol has many modules. The primary programming mode of design aid software based on Zigbee protocol was C procedure. Each module defines the corresponding function. 5.2 SMAT IDENTITY AUTHENTICATION GOUP KEY AGEEMENT POTOCOL BASED ON CLUSTE STUCTUE Burmester and Desmedt put forward the efficient key agreement protocol that only needs two wheel processes (BD protocol) [10]. However, this protocol is a non-authenticated group key agreement protocol, which cannot provide authentic function. Zheng Minghui [8] put forward the improved function that added message authentic, which proved the security of protocol under OM. The identity authentic group key agreement protocol based on cluster structure applied BD protocol that has authentic function to wireless sensor network, which has improved the existing problem of protocol itself. At the same time, it also met the lowenergy requirement of wireless sensor network. The requirement of small calculated amount and storage space has met the requirement of wireless sensor network security on data security and node security. 5.3 IMPLEMENTATION OF SMAT INTUSION DETECTION POLICY BASED ON WHOLE NETWOK COOPEATION Based on smart intrusion detection model, the provided methods for model was analysed and solved according to the detection requirement of wireless sensor network, which verified the idea proposed by the model. According to the characteristics of wireless sensor network, the wireless sensor network security policy that integrated active intrusion detection policy and passive intrusion prevention key policy together was realized with secure routing policy as carrier. It put forward the corresponding implement method and process of secure routing, key policy and intrusion detection plan. 6 Conclusions Wireless sensor network is extensively used in modern society. However, such kind of network has many security problems because of the characteristics of wireless sensor network. In order to solve these problems, this paper put forward a security policy of wireless sensor network that integrated three aspects together. Each policy of this module cooperates mutually, and through a set of smart analysis, recognition, authentic and detection mechanism to form a comprehensive security defense and problem solving model for the overall wireless sensor network. 7 Acknowledgements Supported by Found of Fujian Educal Committee (Grant No: JB12280); Supported by Training the Key Members of the Outstanding Young Teacher of Minnan Science and Technology Institute, FuJian Normal University (Grant No: mkq201008) 572 Inform and Computer Technologies

eferences [1] Shao J 2010 Technology and Applics of Wireless Sensor Networks China Electric Power Press 3-4 (in Chinese) [2] Akyildiz I F, Su W, Sankarasubramaniam Y, Cayirci E 2002 IEEE Communics Magazine 40(8) 102-14 [3] Yao J, Yang X, Yi J, Han J 2012 Principle and Applic of Wireless Sensor Network Higher Educ Press 51-5 [4] Li J, Gao H 2008 Survey on Sensor Network esearch Journal of Computer esearch and Development 45(1) 1-15 [5] Levis P, Lee N, Welsh M, Culler D 2005 TOSSIM: Accurate and Scalable Simul of Entire TinyOS Applics The 1st Internal Conference on Embedded Networked Sensor Systems Los Angeles CA USA New York ACM 30(1) 122-73 [6] Enge A 2007 Elliptic Curve and Its Applic and Guidance in Cryptology Beijing Science Press (in Chinese) [7] Li X 2009 Intrusion Detection Method of Wireless Sensor Network. Beijing University of Technology (in Chinese) [8] Zheng M 2008 Key Agreement Protocol of Provable Security Wuhan Huazhong University of Science and Technology (in Chinese) [9] DaSilva A, Martins M, ocha B, Loureiro A, uiz L, Wong H 2005 Decentralized Intrusion Detection in Wireless Sensor Networks Proceedings of the 1st ACM Internal Workshop on Quality of Service & Security in Wireless and Mobile Networks Montreal Quebec Canada [10] Chen J, Cheng L, Si T, et al 2007 Intranet Security Strategy Based on a Monitor System Journal of Tsinghua University (Science and Technology) 47(4) 606-9 (in Chinese) Author Xiehua Yu, born in 1982, Hunan Province of China Current position, grades: associate professor. University studies: Master s degree of computer science and technology, Central South University in 2004. Scientific interest: wireless sensor network, artificial intelligence, inform and network security. 573 Inform and Computer Technologies