SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010




      A Traffic-Aware Key Management
Architecture for Reducing Energy Consumption
         in Wireless Sensor Networks
                            C.Gnana Kousalya1, J. Raja2, and Dr.G.S.Anandha Mala3
                                        1
                                         Anna University, Chennai -25, India.
                                          Email: kousalyaphd@yahoo.com
                                 2
                                   SSN College of Engineering/IT, Tamil Nadu, India
              3
                St.Joseph's College of Engineering/Computer Science and Engineering, Chennai, India

   Abstract— In Wireless Sensor Networks (WSNs), most                In wireless sensor networks, a sensor node may
of the existing key management schemes, establish shared          communicate with a small set of neighbor sensor
keys for all pairs of neighbor sensor nodes without               nodes. Most of the existing key management schemes,
considering the communication between these nodes.
                                                                  did not consider this communication between these
When the number of sensor nodes in WSNs is increased
then each sensor node is to be loaded with bulky amount
                                                                  nodes. They establish shared keys for all pairs of
of keys. In WSNs a sensor node may communicate with a             neighbor sensor nodes. When the number of sensor
small set of neighbor sensor nodes. Based on this fact, in        nodes in WSNs is increased, large number of keys is to
this paper, an energy efficient Traffic-Aware Key                 be loaded in each sensor node, which in turn causes
Management (TKM) scheme is developed for WSNs,                    more energy consumption. If any two close sensor
which only establishes shared keys for active sensors             nodes are rarely in the active-state the assignment of
which participate in direct communication. The proposed           shared keys may be unnecessary, since they may be
scheme offers an efficient Re-keying mechanism to                 hardly exploited.
broadcast keys without the need for retransmission or
                                                                     In this paper, a Traffic-Aware Key Management
acknowledgements. Numerical results show that proposed
key management scheme achieves high connectivity. In              (TKM) scheme is proposed for WSNs, which only
the simulation experiments, the proposed key                      establishes shared keys for active sensor nodes which
management scheme is applied for different routing                participate in direct communication, based on the
protocols. The performance evaluation shows that                  topology information of the network. To inform about
proposed scheme gives stronger resilence, low energy              the state of a sensor node RTS/CTS control frames are
consumption and lesser end to end delay.                          modified from their original MAC.              Proposed
                                                                  scheme reduces energy consumption with higher
Index  Terms—Wireless       sensor    Network,         Key        connectivity and stronger resilience against node
management, Key Pre-distribution, Re-keying
                                                                  capture.
                                                                     The paper is organized as follows. Section 2 gives
                     I. INTRODUCTION                              brief literature review on various key management
   The utilization of wireless sensor networks a tool for         schemes for WSN. Section 3 describes proposed key
data aggregation and data processing has become                   pre-distribution scheme. Section 4 gives the
increasingly efficient and popular. These tools aid in            performance evaluation in terms of numerical and
the monitoring of customary activities, environmental             simulation results. Section 5 concludes the paper.
conditions and more besides aiding in cost effective
administration of remote and hazardous locations.                                   II. RELATED WORK
Close interaction of WSNs with their physical                        Various key management schemes for WSNs are
environment and unattended deployement of sensor                  proposed for past few years.       Wenliang Du et al.
nodes in hostile environment make WSNs highly                     [2004] proposed key management using deployement
vulnerable to attacks. Imparting security in wireless             knowledge. Alan price et al. [2004] proposed
sensor networks is considered to be a tedious task.               authentication and key distribution in one set of
   WSNs is built with a large number of small battery             protocols .For Distributed Sensor Network (DSN) an
powered device with limited energy, memory,                       alternative of random key pre-distribution scheme has
computation and communication capabilities. Due to                been proposed by Siu-Ping Chan et al. [2005].Rui
this insufficient resources in WSNs, Key management               Miguel Soares Silva et al.[2006] proposed a scheme to
approaches used in Ad-Hoc and other wireless network              overcome the disadvantages of the real symmetrical
cannot be applied to WSNs. From literature it is found            based systems using properties of chaotic systems.
that reasonable and accepted solution for key                     Grid-group deployment scheme has been proposed by
management in WSNs is to distribute randomly                      Dijiang Huang et al. [2004]. “PKM", an in-situ key
generated keys to each sensor node.


                                                             51
© 2010 ACEEE
DOI: 01.ijns.01.02.10
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


management protocol for sensor networks was                       the network, increase end-to-end latency, etc.
proposed by F. Cheng et al. [2005].Jaemin Park et al.
                                                                  B. Selective Forwarding
[2005] proposed random key pre-distribution scheme.
    Neighbor-based authentication is explained briefly in            In a selective forwarding attack, malicious nodes
literature. Sanzgiri et al.[2002] proposed the scheme in          may refuse to forward certain messages and simply
which the hash value of the packet corresponds to the             drop them, ensuring that they are not propagated any
decrypted value, the previous certificate is removed by           further. A simple form of this attack is when a
the current node followed by the forwarding of the                malicious node behaves like a black hole and refuses to
packet with the certificate of the current node.Both the          forward every packet she sees. A more subtle form of
target and intermediary participants were involved in             this attack is when an adversary selectively forwards
the authentication of the data to be routed according to          packets. Selective forwarding attacks are typically most
a fresh approach Ariadne proposed by Hu et al.                    effective when the attacker is explicitly included on the
[2002].Every node present in the source–destination               path of a data flow. However, it is conceivable an
path determines the authentication of the routing                 adversary overhearing a flow passing through
information with the aid of a Tesla key proposed by               neighboring nodes might be able to emulate selective
Perrig et al.[2002], in the course of the route discovery         forwarding by jamming or causing a collision on each
process.                                                          forwarded packet of interest.
    Majority of the schemes use public key cryptography           C. Sinkhole Attack
to attain security. But as the sensor nodes in wireless
                                                                     In a sinkhole attack, the adversary’s goal is to lure
sensor networks are resource constraint the usage of
                                                                  nearly all the traffic from a particular area through a
public key cryptography in WSNs is not feasible.
                                                                  compromised node, creating a metaphorical sinkhole
    Routing protocols in wireless network are explined
                                                                  with the adversary at the center. Because nodes on, or
briefly in literature. Charles E.Perkins et al.[1999]
                                                                  near, the path that packets follow have many
proposed AODV            (Ad-Hoc On Demand Distance
                                                                  opportunities to tamper with application data, sinkhole
Vector Routing) reactive type routing protocol.
                                                                  attacks can enable many other attacks. Sinkhole attacks
Proactive type routing protocol DSDV (Destination
                                                                  typically work by making a compromised node look
Sequence Distance Vector Routing) is proposed by
                                                                  especially attractive to surrounding nodes with respect
Charles E.Perkins et al.[1994] and DSR(Dynamic
                                                                  to the routing algorithm. One motivation for mounting
Source Routing) is proposed by David B.Johnson et
                                                                  a sinkhole attack is that it makes selective forwarding
al.[2002] From the literature it is found that Cluster
                                                                  trivial.
formation to reduce the energy consumed is proposed
in LEACH a hierarchical type routing protocol In                  D. Sybil Attack
another type of routing protocol PEGASIS, each sensor                In a Sybil attack, a single node presents multiple
node communicates only with a close neighbor and                  identities to other nodes in the network. The Sybil
takes turns in transmitting to the base station , thus            attack can significantly reduce the effectiveness of
reducing energy.                                                  fault-tolerant schemes such as distributed storage,
                                                                  dispersity and multipath routing, and topology
       III. THREATS TO WIRELESS SENSOR NETWORKS                   maintenance. Replicas, storage partitions, or routes
   Most network layer attacks against sensor networks             believed to be using disjoint nodes could in actuality be
fall into one of the following categories: [19]                   using a single adversary presenting multiple identities.
      • Spoofed, altered, or replayed routing                     Sybil attacks also pose a significant threat to
          information                                             geographic routing protocols.
      • Selective forwarding                                      E. Wormhole Attack
      • Sinkhole attacks                                             In the wormhole attack, an adversary tunnels
      • Sybil attacks                                             messages received in one part of the network over a
      • Wormholes                                                 low-latency link and replays them in a different part.
      • HELLO flood attacks                                       The simplest instance of this attack is a single node
      • Acknowledgement spoofing                                  situated between two other nodes forwarding messages
      • Node Capture Attacks                                      between the two of them. However, wormhole attacks
                                                                  more commonly involve two distant malicious nodes
A. Spoofed, altered, or replayed routing information
                                                                  colluding to understate their distance from each other
   The most direct attack against a routing protocol is           by relaying packets along an out-of-bound channel
to target the routing information exchanged between               available only to the attacker.
nodes. By spoofing, altering, or replaying routing
information, adversaries may be able to create routing            F. HELLO Flood Attack
loops, attract or repel network traffic, extend or shorten           A novel attack against sensor networks is the
source routes, generate false error messages, partition


                                                             52
© 2010 ACEEE
DOI: 01.ijns.01.02.10
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


HELLO flood attack. Many protocols require nodes to              (NTN).
broadcast HELLO packets to announce themselves to                   In the proposed scheme RTS/CTS control frames is
their neighbors, and a node receiving such a packet              slightly modified from their original MAC protocol for
may assume that it is within (normal) radio range of the         informing a node the fact that its state is changed to TN
sender. This assumption may be false: a laptop-class             or NTN in the corresponding period.
attacker broadcasting routing or other information with
large enough transmission power could convince every                                           10 Bytes
node in the network that the adversary is its neighbor.
An adversary does not necessarily need to be able to
construct legitimate traffic in order to use the HELLO
flood attack. It can simply rebroadcast overhead
packets with enough power to be received by every                         Figure1. a The Original RTS and CTS Frames
node in the network. HELLO floods can also be
thought of as one-way, broadcast wormholes.
G. Acknowledgement Spoofing
   Several sensor network routing algorithms rely on
implicit or explicit link layer acknowledgements. Due
to the inherent broadcast medium, an adversary can                        Figure1. b) The Modified RTS and CTS Frames
spoof link layer acknowledgments for ‘‘overheard’’
packets addressed to neighboring nodes. Goals include               The modified RTS and CTS frame add only one
convincing the sender that a weak link is strong or that         field of two bytes to the original frame. The newly
a dead or disabled node is alive. Since packets sent             added bytes in RTS is destination address and the
along weak or dead links are lost, an adversary can              newly added bytes of CTS is TN address
effectively mount a selective forwarding attack using
acknowledgement spoofing by encouraging the target
node to transmit packets on those links.
H. Node Capture Attacks
   The combination of passive attacks, active attacks,
                                                                             Figure. 2: Classification of Node States
and physical attacks used by the malicious user/users to
seize or corrupt network and takes control over the
                                                                    Referring Figure 2, when node B receives A’s
node is known as “Node capture attack”.[20] The
                                                                 modified RTS frame including the destination address
malicious user may induce replicated or corrupted
                                                                 of sink, its routing agent refers to the routing table for
information into the node which can impact the whole
                                                                 getting the next TN (node C) and informs back to its
network/link to be malfunctioning. These “node
                                                                 MAC. The node B then transmits modified CTS frame
capture attacks” occur due to the improper attention of
                                                                 to node C which changes its state to TN and other
the wireless nodes and the high cost of fool-proof
                                                                 neighbor nodes become aware of the fact that they are
hardware in portable devices. [21] The threats which
                                                                 NTN nodes. Otherwise the routing path is broken or
are involved due to compromised (captured) node are
                                                                 has not yet been established.
much more severe than the attacks from outside the
                                                                    The Proposed Key management scheme consists of
network. As mobile nodes are autonomous and can join
                                                                 following phases:
or leave any network at will, it is hard to keep track of
                                                                    i. Initial setup phase
such nodes constantly.
                                                                    ii.Pre-distribution phase
   When a node is under attack or compromised, the
                                                                    iii Shared Key discovery phase
keys are exposed to the intruders. Under such a
                                                                    iv.Path key establishment phase
condition, other’s keys are also in a compromised state
                                                                    v. Rekeying Phase
as these keys are also used by other nodes
   In this paper replay attack and node capture attacks          A. Initial Setup
are considered.                                                     Two keys, namely the Node key K and Network key
                                                                 NK are used in this scheme. The latter is utilized by the
        IV. PROPOSED KEY MANAGEMENT SCHEME                       individual sensor nodes for the encryption and
   The proposed Key management scheme is based on                decryption purposes while the former is used by the
the state of sensor nodes. State of sensor nodes are             key server node to unicast the node keys to the sensor
categorized in to three types as follows: Current                nodes.
transmitting node (CTN), Transmitting node (TN),                    Sensor nodes agree on the following system
transmitting Node (CTN), Non transmitting Node                   parameters used in the protocol. The system parameters
                                                                 include


                                                            53
© 2010 ACEEE
DOI: 01.ijns.01.02.10
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


   Global Key Pool: Defined as a pool of random                 and send to every sensor nodes
symmetric keys from which a group key pool is
generated. Keys are generated using one way function            Commandnode → E NK ( INIT )
F, where n is chosen to be large.                                   Once the INIT packet is received, a sensor node
                                                                resets all previous keys. It then calculates new keys K
K i = F ( Ki + 1) i = 1,2,3,...n                                i ,..., K1 from K i +1 . The subsequent key in the key-
   Group Key Pool: Defined as a subset of Global key            sequence is broadcasted by the command node
                                                                periodically with the aid of UPDATE control packet.
pool for a given group.
   Key Ring: Defined as a subset of group key pool,             The node keys are disclosed by the command node in a
                                                                periodic manner from the to K           all nodes in the
which is independently assigned to each sensor node.                                               L+2
   Key-Sharing Graph: Let V represent all the nodes in          group.At time T         + T       ,the server broadcasts
                                                                                  start     rekey
WSN. A Key-Sharing graph G (V, E) is constructed in
                                                                UPDATE packets containing K i + L + 2, i =1,2,....,n −
the following manner: For any two nodes i and j in V,
                                                                L − 2 ,Command node → group : E K i +1 ( K i + L +
there exists an edge between them if and only if (1)
                                                                2)
nodes i and j have at least one common key, and (2)
                                                                Where Eki +1 is the active encryption key at the time
nodes i and j can reach each other within the wireless          when UPDATE packet is broadcasted.
transmission range, i.e., in a single hop.                          The UPDATE packet is discarded once the node
B. Key Pre-Distribution Phase                                   detects that it is not from its own server. If not, the
                                                                UPDATE packet is broadcasted to all the neighbors.
   This phase is performed off-line and before the
deployment of sensor nodes. Primarily group key pools
                                                                              V. PERFORMANCE EVALUATION
Gi (i = 1,2,..., k )) are produced using global key pool
S. After this, for each sensor node in a group, a key
                                                                A. Evaluation Metrics
ring from a group key pool is Gi assigned along with a
variable.                                                          In the proposed scheme following evaluation metrics
                                                                are considered:
C. Shared-Key Discovery Phase                                      Connectivity: The probability that two sensors share
   This phase is used to find a secure link between two         at least one common key at a given time-interval
sensor nodes. Sensor nodes which identify its shared            should be higher, with smaller number of keys.
keys in their key rings, then verify that other CTN and            Resilience against Node Capture: Exposing of the
TN node contain these keys. Now the shared key turns            secret information regarding other nodes should be
out to be the key for that link. A key-sharing graph is         made certain by the key establishment technique, if a
created by the entire sensor networks following above           node inside a sensor network is confined.
step. The execution of the shared key discovery phase              Any efficient key management scheme for WSNs
is completed by a CTN node, if it finds out a TN node           should have higher connectivity and stronger resilience
as a neighbor.
                                                                B. Numerical Results
D. Path -Key Establishment Phase                                Connectivity
   Sensor nodes can form path keys with their neighbor             It is defined as the probability ( Ps ) that two TN or
nodes since they have not shared keys inside their key          CTN state sensor nodes share atleast a common key
rings. A path can be established from a source sensor           after deployement at a given time interval.
node to other CTN and TN sensor nodes, if the key-                 Let φ is the set of all sensor node groups and two
sharing graph is connected. A path key can be                   nodes Ni and NJ are selected fromGj and Gi of φ .
generated by the source node and send it safely using a         The probability that Ni and N j are in TN state at given
path to the target sensor node.                                 time-interval, and two nodes share at least one common
E. Re-keying Phase                                              key is given by Ps. Using Baye’s Theorem,
  This Phase uses two control packetsand INIT
UPDATE .The command node prepares a control
packet INIT which contains
INIT : ( L, K i +1, Trekey ), MAC(L, K i +1, Trekey )
L – length of the key
Ki - initial key                                                 Where, P1 (Ti ) – – Probability of group G at a time
                                                                                                               i
Trekey - Rekeying interval of Ki                                interval Ti P3 ( Sh) - - Probability that two nodes share
This control packet is encrypted with network key NK            at least one common key
                                                                   The probability that two nodes are in TN state at a


                                                           54
© 2010 ACEEE
DOI: 01.ijns.01.02.10
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010



given time-interval Ti is calculated using                                         [2006]. It is found that lesser number of keys is
                                                                                   involved in the proposed scheme to achieve the same
                                                                                   probability.
                                    i
                            −    a tm
f p (ti m ) = e                   a                                                C. Simulation Results
                 _______________________________                   (2)                NS2 simulator is used for simulation with following
                                                                                   specifications:
                                  x!                                                    • Maximum Number of nodes is 80
 Therefore the active-probability of Gi at T can be                                     • The deployment area is 500mx500 m.
                                            i                                           • Simulation time is 100 seconds.
found as follows                                                                        • The transmission range of 250 meters with
                                                                                            Constant Bit Rate (CBR).
                                                                                      The proposed key management is applied with
                                                                                   routing protocols DSDV, LEACH and PEGASIS and
                                                                                   simulated to find resilience, energy consumed and end
                                                                                   to end delay performance.

                                                                                   Effects of Resilience against Node Capture
                                                                                      An adversary can attack on a sensor node after it is
                                                                                   deployed to read the information. To find how a
                                                                                   successful attack on n sensor nodes by an adversary
  The probability that two nodes share at least one                                affects the rest of the network resilience is used.
common key is expressed as                                                         Resilience is calculated from the fraction of
                                                                                   communication among the uncompromised nodes that
1 − pr two sensors do not share any key]. (4)
                                                                                   an adversary can compromise based on the information
Consider
                                                                                   retrieved from the n captured nodes. Using the routing
Total size of each group = M
                                                                                   protocols DSDV, LEACH, and PEGASIS, resilience is
Shared keys               = Sh(M )
                                                                                   measured for the proposed TKM scheme with varying
Non-Shared keys           = M − Sh(M )
                                                                                   number of nodes and attackers and compared with
   Let n1 , n 2 be two sensor nodes. When n1select x
                                                                                   SHELL proposed by Mohemed F.Younis et al.[2006].
keys from keys Sh(M ) and y keys from M − Sh(M )
keys, then n2 select z keys from ( M − x) Keys.
                                                                                                                     Resilience for various attackers
   Pr [two sensors do not share any key] is given by
                                                                                                                 1
                                                                                                            0.8                                         DSDV-5
                                                                                              resilience




                                                                                                            0.6                                         DSDV-10
                                                                                                            0.4                                         DSDV-15
                                                                                                            0.2                                         DSDV-20
                                                                                                                 0
                                                                                                                     20     40       60    80
                                                                                                                                nodes



                                                                                                            Figure 4.a.Resilence Vs Nodes-DSDV
                            1

                           0.8
                                                                                                                     Resilience for various Attackers
            Connectivity




                           0.6                                   TKM

                           0.4                                   Existing
                                                                                                            1
                           0.2                                                                             0.8                                          LEACH-5
                            0                                                                              0.6                                          LEACH-10
                                                                                           resilience




                                 25    50    75    100   120
                                                                                                           0.4                                          LEACH-15
                                            Keys
                                                                                                           0.2                                          LEACH-20
                                                                                                            0
             Figure 3.Connectivity Vs No. of Keys                                                                    20    40       60     80
                                                                                                                             nodes
   Figure.3 gives the connectivity with respect to the
varied number of keys in each sensor. The proposed
scheme is compared with the existing random key pre-                                                       Figure 4.b.Resilence Vs Nodes-LEACH
distribution scheme of Mohamed F. Younis et al.’s


                                                                              55
© 2010 ACEEE
DOI: 01.ijns.01.02.10
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010



                            Resilience For Varous Attackers

                      1
                     0.8                                    PEGASIS-5
      Resilience




                     0.6                                    PEGASIS-10
                     0.4                                    PEGASIS-15
                     0.2                                    PEGASIS-20
                      0
                             20     40    60     80
                                     Nodes


                                                                                            Figure5.a. Energy Consumption Vs Nodes –DSDV
                       Figure. 4.c.Resilence Vs Nodes-PEGASIS

                                                                                                             Energy For Various Attackers
                            Resilience For Various Attacke rs

                                                                                                  0.6
                     1.2
                                                                                                  0.5
                       1                                                                                                                       LEACH-5
                                                                SHELL-5                           0.4




                                                                                      energy(j)
        resilience




                     0.8                                                                                                                       LEACH-10
                                                                SHELL-10                          0.3
                     0.6                                                                                                                       LEACH-15
                                                                SHELL-15                          0.2
                     0.4                                                                                                                       LEACH-20
                                                                SHELL-20                          0.1
                     0.2
                                                                                                   0
                       0
                                                                                                        20        40           60        80
                              20    40    60     80
                                                                                                                       nodes
                                     nodes

                                                                                       Figure 5.b. Energy Consumption Vs Nodes –LEACH
                           Figure 4.d.Resilence Vs Nodes-SHELL
                                                                                   Figure 5.a shows the energy consumed with TKM-
   Figure 4.a shows the resilience with TKM using                               DSDV. With increase in the number of nodes from 20
routing protocol DSDV. With increase in the number of                           nodes to 80 nodes and increase in number of attackers
nodes from 20 to 80 nodes and increase in number of                             from 5 attackers to 20 attackers the energy consumed is
attackers from 5 to 20 attackers the resilience is                              reduced by 43% to 47% when compared with SHELL
reduced by 55% to 61%.                                                             Figure 5.b shows the energy consumed with TKM-
   Figure 4.b shows the resilience with TKM using                               LEACH. Number of nodes is increased from 20 nodes
routing protocol LEACH.With increase in the number                              to 80 nodes and the number of attackers is also
of nodes from 20 to 80 nodes and increase in number of                          increased from 5 attackers to 20 attackers and it is
attackers from 5 attackers to 20 attackers the resilience                       observed that the energy consumed is reduced by 58%
is reduced by 79% to 81%.                                                       to 62% when compared with SHELL
   Figure 4.c shows the resilience with TKM using                                  Figure 5.c shows the energy consumed with TKM
routing protocol PEGASIS. With increase in the                                  using routing protocol PEGASIS. With increase in the
number of nodes from 20 to 80 nodes and increase in                             number of nodes from 20 nodes to 80 nodes and
number of attackers from 5 to 20 attackers the                                  increase in number of attackers from 5 attackers to 20
resilience is reduced by 86% to 88%.                                            attackers the energy consumed is reduced by 69% to
   Figure 4.d shows the resilience with SHELL. With                             71% when compared with SHELL
increase in the number of nodes from 20 to 80 nodes
and increase in number of attackers from 5 to 20                                                         Energy For Various Attackers

attackers the resilience is reduced only by 28% to 38%.
                                                                                                  0.4
   It is found from fig 4.a-e the performance of
resilience is best in TKM-PEGASIS and hence more                                                  0.3                                         PEGASIS-5
                                                                                      energy(j)




secure when compared with TKM using LEACH,                                                        0.2
                                                                                                                                              PEGASIS-10

DSDV and SHELL.                                                                                                                               PEGASIS-15
                                                                                                  0.1                                         PEGASIS-20

Effects of Energy Consumption against Node Capture                                                  0
   Energy consumed by the network is obtained by                                                        20       40       60        80

varying total number of nodes and attackers with TKM                                                              nodes

using routing protocols DSDV, LEACH and PEGASIS.
Proposed TKM scheme is compared with SHELL.                                          Figure 5.c. Energy Consumption Vs Nodes -PEGASIS




                                                                           56
© 2010 ACEEE
DOI: 01.ijns.01.02.10
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010



                                                   Energy For Various Attackers                                                                   Delay For Various Attackers

                                1.4
                                1.2                                                                                                   0.8
                                    1                                                       SHELL-5                                                                             PEGASIS-5
                                                                                                                                      0.6
                    energy(j)




                                0.8                                                         SHELL-10
                                                                                                                                                                                PEGASIS-10




                                                                                                                           Delay(s)
                                0.6                                                         SHELL-15                                  0.4
                                0.4                                                                                                                                             PEGASIS-15
                                                                                            SHELL-20
                                                                                                                                      0.2
                                0.2                                                                                                                                             PEGASIS-20
                                    0                                                                                                   0
                                             20            40           60        80
                                                                                                                                             20      40       60    80
                                                                nodes
                                                                                                                                                         Nodes
     .
            Figure 5.d. Energy Consumption Vs Nodes –SHELL                                                      .
                                                                                                                                            Figure 6.c.Delay Vs Attackers
   From figure 5.a to 5.d it is observed that TKM-
PEGASIS consumes less energy for specific                                                                                                    Delay For Various Attackers
transmission when compared with TKM using
LEACH, DSDV and SHELL.                                                                                                         1.75

                                                                                                                                  1.7                                           SHELL-5




                                                                                                                    Delay(s)
Effects of End to End Delay against Node Capture                                                                               1.65
                                                                                                                                                                                SHELL-10
                                                                                                                                                                                SHELL-15
                                                  Delay For Various Attackers
                                                                                                                                  1.6                                           SHELL-20
                                1                                                                                              1.55
                        0.8                                                                DSDV-5                                           20      40      60     80
         Delay(s)




                        0.6                                                                DSDV-10                                                    Nodes
                        0.4                                                                DSDV-15
                        0.2                                                                DSDV-20
                                                                                                                                            Figure 6.d. Delay Vs Attackers
                                0
                                        20            40           60         80
                                                           Nodes                                               From figure 6.a-d it is observed that end to end delay
                                                                                                            is reduced more in TKM–PEGASIS when compared
                                         Figure 6.a. Delay Vs Attackers                                     with TKM using LEACH, DSDV and SHELL.

   Figure 6.a shows that the end to end delay is reduced                                                                                           VI. CONCLUSION
by 49% to 63% with TKM-DSDV when compared with
                                                                                                               The proposed scheme establishes shared keys for
SHELL with increase in the number of nodes from 20
                                                                                                            active sensor nodes which participate in direct
nodes to 80 nodes and number of attackers from 5 to 20
                                                                                                            communication, based on the topological information
attackers.
                                                                                                            of the network. This scheme provides seamless re-
   Figure 6.b.shows that the end to end delay is reduced
                                                                                                            keying without disrupting the ongoing security process.
by 54% to 61% with TKM-LEACH when compared
                                                                                                            Numerical results show that the proposed scheme
with SHELL with increase in the number of nodes from
                                                                                                            achieves high connectivity. The simulation is
20 nodes to 80 nodes and number of attackers from 5
                                                                                                            performed for the proposed scheme with different
attackers to 20 attackers
                                                                                                            routing protocols. Performance analysis shows that
   Figure 6.c shows that the end to end delay is reduced
                                                                                                            proposed key management scheme TKM with
by 61% to 65% with TKM-PEGASIS when compared
                                                                                                            PEGASIS achieves stronger resilience low energy
with SHELL with increase in the number of nodes from
                                                                                                            consumption and lesser end to end delay when
20 nodes to 80 nodes and number of attackers from 5
                                                                                                            compared with SHELL.
attackers to 20 attackers.
                                              Delay For Various Attackers                                                                            REFERENCES
                                1                                                                           [1] Wenliang DuJing DengHan, Y.S.Shigang Chen
                        0.8                                                               LEACH-5               Varshney, P.K.“A Key Management Scheme for
         Delay(s)




                        0.6                                                               LEACH-10              Wireless Sensor Networks Using Deployment
                        0.4                                                               LEACH-15              Knowledge”      INFOCOM       2004.  Twenty-third
                        0.2                                                               LEACH-20              AnnualJoint Conference of the IEEE Computer and
                                0                                                                               Communications Societies 7-11 March 2004.
                                        20            40           60        80
                                                                                                            [2] Alan Price, Kristie Kosaka and Samir Chatterjee “A
                                                           Nodes                                                Secure Key Management Scheme for Sensor Networks”
                                                                                                                Proceedings of the Tenth Americas Conference on
                                         Figure 6.b. Delay Vs Attackers                                         Information Systems, New York, New York, August
                                                                                                                2004.


                                                                                                       57
© 2010 ACEEE
DOI: 01.ijns.01.02.10
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


[3] Siu-Ping Chan, Radha Poovendran and Ming-Ting Sun                 [10] A. Perrig, R. Canetti, D. Tygar, and D. Song. “The
     “A Key Management Scheme in Distributed Sensor                        TESLA Broadcast Authentication Protocol”. In RSA
     Networks Using Attack Probabilities” Global                           CryptoBytes, volume 5(2), pages 2–13, 2002
     Telecommunications Conference, 2005.GLOBECOM                     [11] Charles E. Perkins, Elizabeth M. Royer “Ad hoc On
     '05. 28 Nov.-2 Dec. 2005                                              Demand Distance Vector Routing” Mobile Computing
[4] Rui Miguel Soares Silva, Nuno Sidónio Andrade Pereira                  Systems and Applications, 1999. Proceedings. WMCSA
     and Mário Serafim Nunes             "Chaos Based Key                  '99. Second IEEE Workshop on Publication Date: 25-26
     Management Architecture for Wireless Sensor                           Feb 1999.
     Networks", Australian Telecommunication Networks                 [12] C.E. Perkins and P.Bhagwat. ”Highly Dynamic
     and Application Conference [ATNAC 2006], December                     Destination-Sequenced Distance-Vector routing (DSDV)
     4-6, 2006.                                                            for mobile computers”. In Proceedings of the
[5] Dijiang Huang, Manish Mehta, Deep Medhi and Lein                       SIGCOMM’94 conference on Communications,
     Harn “Location Aware Key Management Scheme for                        Architectures, Protocols, and Applications, August 1994.
     Wireless Sensor Networks” Proc. of 2004 ACM                      [13] David B. Johnson and David A. Maltz “Dynamic Source
     Workshop on Security of Ad Hoc and Sensor Networks                    Routing in Ad Hoc Wireless Networks” Wiley Series On
     (SASN'04), pp. 29-42, October 2004                                    Parallel And Distributed Computing, Pages: 425 –
[6] An, F. Cheng, X. Rivera, J. M. Li, J. Cheng, Z. “PKM: A                450,Year of Publication: 2002 ISBN:0-471-41902-8.
     Pairwise Key Management Scheme for Wireless Sensor                [14] Changsu Suh, Young-Bae Ko and Dong-Min Son, "An
     Networks” Lecture Notes In Computer Science 2005,                     Energy Efficient Cross-Layer MAC Protocol for
     Numb 3619, pages 992-1001.                                            Wireless Sensor Networks," Proc. of the International
[7] Jaemin Park, Zeen Kim, and Kwangjo Kim “State-Based                    Workshop on Sensor Networks (IWSN'06) in APWeb06,
     Key Management Scheme for Wireless Sensor                             Jan. 2006. (LNCS),
     Networks” Mobile Adhoc and Sensor Systems                          [15] Mohamed F. Younis , Kajaldeep Ghumman and
     Conference, 2005. IEEE International Conference on 7-                 Mohamed Eltoweissy “Location-Aware Combinatorial
     10 Nov. 2005.                                                         Key Management Scheme for Clustered Sensor
[8] K. Sanzgiri, Bridget Dahill, B. Levine, C. Shields, and E.             Networks” , IEEE transactions on parallel and
     Belding-Royer.”Secure routing Protocol for Ad Hoc                     distributed systems, Vol. 17, No. 8, August 2006.
     Networks”. In Proceedings of the IEEE International
     Conference on Network Protocols, 2002
[9] Y. Hu, A. Perrig, and D. Johnson. “Ariadne: A secure on-
     demand routing protocol for ad hoc networks”. In
     Proceedings of the International Conference on Mobile
     Computing and Networking (MobiCom), 2002




                                                                 58
© 2010 ACEEE
DOI: 01.ijns.01.02.10

Más contenido relacionado

La actualidad más candente

A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
Detection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksDetection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksambitlick
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...ijmnct
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithmskitechsolutions
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkIJERA Editor
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessfarrukh Farrukh
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
 

La actualidad más candente (20)

A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
Detection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksDetection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networks
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithms
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
Hack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor NetworkHack Recognition In Wireless Sensor Network
Hack Recognition In Wireless Sensor Network
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wireless
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 

Destacado

Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...IDES Editor
 
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...IDES Editor
 
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksAnalysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksIDES Editor
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...IDES Editor
 
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance AngiogramsExtraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance AngiogramsIDES Editor
 
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...IDES Editor
 
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation SystemOptimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation SystemIDES Editor
 
Conditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital FilterConditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital FilterIDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 

Destacado (9)

Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
 
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
 
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksAnalysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
 
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance AngiogramsExtraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
 
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
 
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation SystemOptimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
 
Conditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital FilterConditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital Filter
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 

Similar a A Traffic-Aware Key Management Architecture for Reducing Energy Consumption in Wireless Sensor Networks

A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network IJORCS
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 

Similar a A Traffic-Aware Key Management Architecture for Reducing Energy Consumption in Wireless Sensor Networks (20)

A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
G0933443
G0933443G0933443
G0933443
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Es24906911
Es24906911Es24906911
Es24906911
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
Ids presentation
Ids presentationIds presentation
Ids presentation
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
Cn24588592
Cn24588592Cn24588592
Cn24588592
 

Más de IDES Editor

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 

Más de IDES Editor (20)

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 

Último

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

A Traffic-Aware Key Management Architecture for Reducing Energy Consumption in Wireless Sensor Networks

  • 1. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 A Traffic-Aware Key Management Architecture for Reducing Energy Consumption in Wireless Sensor Networks C.Gnana Kousalya1, J. Raja2, and Dr.G.S.Anandha Mala3 1 Anna University, Chennai -25, India. Email: kousalyaphd@yahoo.com 2 SSN College of Engineering/IT, Tamil Nadu, India 3 St.Joseph's College of Engineering/Computer Science and Engineering, Chennai, India Abstract— In Wireless Sensor Networks (WSNs), most In wireless sensor networks, a sensor node may of the existing key management schemes, establish shared communicate with a small set of neighbor sensor keys for all pairs of neighbor sensor nodes without nodes. Most of the existing key management schemes, considering the communication between these nodes. did not consider this communication between these When the number of sensor nodes in WSNs is increased then each sensor node is to be loaded with bulky amount nodes. They establish shared keys for all pairs of of keys. In WSNs a sensor node may communicate with a neighbor sensor nodes. When the number of sensor small set of neighbor sensor nodes. Based on this fact, in nodes in WSNs is increased, large number of keys is to this paper, an energy efficient Traffic-Aware Key be loaded in each sensor node, which in turn causes Management (TKM) scheme is developed for WSNs, more energy consumption. If any two close sensor which only establishes shared keys for active sensors nodes are rarely in the active-state the assignment of which participate in direct communication. The proposed shared keys may be unnecessary, since they may be scheme offers an efficient Re-keying mechanism to hardly exploited. broadcast keys without the need for retransmission or In this paper, a Traffic-Aware Key Management acknowledgements. Numerical results show that proposed key management scheme achieves high connectivity. In (TKM) scheme is proposed for WSNs, which only the simulation experiments, the proposed key establishes shared keys for active sensor nodes which management scheme is applied for different routing participate in direct communication, based on the protocols. The performance evaluation shows that topology information of the network. To inform about proposed scheme gives stronger resilence, low energy the state of a sensor node RTS/CTS control frames are consumption and lesser end to end delay. modified from their original MAC. Proposed scheme reduces energy consumption with higher Index Terms—Wireless sensor Network, Key connectivity and stronger resilience against node management, Key Pre-distribution, Re-keying capture. The paper is organized as follows. Section 2 gives I. INTRODUCTION brief literature review on various key management The utilization of wireless sensor networks a tool for schemes for WSN. Section 3 describes proposed key data aggregation and data processing has become pre-distribution scheme. Section 4 gives the increasingly efficient and popular. These tools aid in performance evaluation in terms of numerical and the monitoring of customary activities, environmental simulation results. Section 5 concludes the paper. conditions and more besides aiding in cost effective administration of remote and hazardous locations. II. RELATED WORK Close interaction of WSNs with their physical Various key management schemes for WSNs are environment and unattended deployement of sensor proposed for past few years. Wenliang Du et al. nodes in hostile environment make WSNs highly [2004] proposed key management using deployement vulnerable to attacks. Imparting security in wireless knowledge. Alan price et al. [2004] proposed sensor networks is considered to be a tedious task. authentication and key distribution in one set of WSNs is built with a large number of small battery protocols .For Distributed Sensor Network (DSN) an powered device with limited energy, memory, alternative of random key pre-distribution scheme has computation and communication capabilities. Due to been proposed by Siu-Ping Chan et al. [2005].Rui this insufficient resources in WSNs, Key management Miguel Soares Silva et al.[2006] proposed a scheme to approaches used in Ad-Hoc and other wireless network overcome the disadvantages of the real symmetrical cannot be applied to WSNs. From literature it is found based systems using properties of chaotic systems. that reasonable and accepted solution for key Grid-group deployment scheme has been proposed by management in WSNs is to distribute randomly Dijiang Huang et al. [2004]. “PKM", an in-situ key generated keys to each sensor node. 51 © 2010 ACEEE DOI: 01.ijns.01.02.10
  • 2. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 management protocol for sensor networks was the network, increase end-to-end latency, etc. proposed by F. Cheng et al. [2005].Jaemin Park et al. B. Selective Forwarding [2005] proposed random key pre-distribution scheme. Neighbor-based authentication is explained briefly in In a selective forwarding attack, malicious nodes literature. Sanzgiri et al.[2002] proposed the scheme in may refuse to forward certain messages and simply which the hash value of the packet corresponds to the drop them, ensuring that they are not propagated any decrypted value, the previous certificate is removed by further. A simple form of this attack is when a the current node followed by the forwarding of the malicious node behaves like a black hole and refuses to packet with the certificate of the current node.Both the forward every packet she sees. A more subtle form of target and intermediary participants were involved in this attack is when an adversary selectively forwards the authentication of the data to be routed according to packets. Selective forwarding attacks are typically most a fresh approach Ariadne proposed by Hu et al. effective when the attacker is explicitly included on the [2002].Every node present in the source–destination path of a data flow. However, it is conceivable an path determines the authentication of the routing adversary overhearing a flow passing through information with the aid of a Tesla key proposed by neighboring nodes might be able to emulate selective Perrig et al.[2002], in the course of the route discovery forwarding by jamming or causing a collision on each process. forwarded packet of interest. Majority of the schemes use public key cryptography C. Sinkhole Attack to attain security. But as the sensor nodes in wireless In a sinkhole attack, the adversary’s goal is to lure sensor networks are resource constraint the usage of nearly all the traffic from a particular area through a public key cryptography in WSNs is not feasible. compromised node, creating a metaphorical sinkhole Routing protocols in wireless network are explined with the adversary at the center. Because nodes on, or briefly in literature. Charles E.Perkins et al.[1999] near, the path that packets follow have many proposed AODV (Ad-Hoc On Demand Distance opportunities to tamper with application data, sinkhole Vector Routing) reactive type routing protocol. attacks can enable many other attacks. Sinkhole attacks Proactive type routing protocol DSDV (Destination typically work by making a compromised node look Sequence Distance Vector Routing) is proposed by especially attractive to surrounding nodes with respect Charles E.Perkins et al.[1994] and DSR(Dynamic to the routing algorithm. One motivation for mounting Source Routing) is proposed by David B.Johnson et a sinkhole attack is that it makes selective forwarding al.[2002] From the literature it is found that Cluster trivial. formation to reduce the energy consumed is proposed in LEACH a hierarchical type routing protocol In D. Sybil Attack another type of routing protocol PEGASIS, each sensor In a Sybil attack, a single node presents multiple node communicates only with a close neighbor and identities to other nodes in the network. The Sybil takes turns in transmitting to the base station , thus attack can significantly reduce the effectiveness of reducing energy. fault-tolerant schemes such as distributed storage, dispersity and multipath routing, and topology III. THREATS TO WIRELESS SENSOR NETWORKS maintenance. Replicas, storage partitions, or routes Most network layer attacks against sensor networks believed to be using disjoint nodes could in actuality be fall into one of the following categories: [19] using a single adversary presenting multiple identities. • Spoofed, altered, or replayed routing Sybil attacks also pose a significant threat to information geographic routing protocols. • Selective forwarding E. Wormhole Attack • Sinkhole attacks In the wormhole attack, an adversary tunnels • Sybil attacks messages received in one part of the network over a • Wormholes low-latency link and replays them in a different part. • HELLO flood attacks The simplest instance of this attack is a single node • Acknowledgement spoofing situated between two other nodes forwarding messages • Node Capture Attacks between the two of them. However, wormhole attacks more commonly involve two distant malicious nodes A. Spoofed, altered, or replayed routing information colluding to understate their distance from each other The most direct attack against a routing protocol is by relaying packets along an out-of-bound channel to target the routing information exchanged between available only to the attacker. nodes. By spoofing, altering, or replaying routing information, adversaries may be able to create routing F. HELLO Flood Attack loops, attract or repel network traffic, extend or shorten A novel attack against sensor networks is the source routes, generate false error messages, partition 52 © 2010 ACEEE DOI: 01.ijns.01.02.10
  • 3. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 HELLO flood attack. Many protocols require nodes to (NTN). broadcast HELLO packets to announce themselves to In the proposed scheme RTS/CTS control frames is their neighbors, and a node receiving such a packet slightly modified from their original MAC protocol for may assume that it is within (normal) radio range of the informing a node the fact that its state is changed to TN sender. This assumption may be false: a laptop-class or NTN in the corresponding period. attacker broadcasting routing or other information with large enough transmission power could convince every 10 Bytes node in the network that the adversary is its neighbor. An adversary does not necessarily need to be able to construct legitimate traffic in order to use the HELLO flood attack. It can simply rebroadcast overhead packets with enough power to be received by every Figure1. a The Original RTS and CTS Frames node in the network. HELLO floods can also be thought of as one-way, broadcast wormholes. G. Acknowledgement Spoofing Several sensor network routing algorithms rely on implicit or explicit link layer acknowledgements. Due to the inherent broadcast medium, an adversary can Figure1. b) The Modified RTS and CTS Frames spoof link layer acknowledgments for ‘‘overheard’’ packets addressed to neighboring nodes. Goals include The modified RTS and CTS frame add only one convincing the sender that a weak link is strong or that field of two bytes to the original frame. The newly a dead or disabled node is alive. Since packets sent added bytes in RTS is destination address and the along weak or dead links are lost, an adversary can newly added bytes of CTS is TN address effectively mount a selective forwarding attack using acknowledgement spoofing by encouraging the target node to transmit packets on those links. H. Node Capture Attacks The combination of passive attacks, active attacks, Figure. 2: Classification of Node States and physical attacks used by the malicious user/users to seize or corrupt network and takes control over the Referring Figure 2, when node B receives A’s node is known as “Node capture attack”.[20] The modified RTS frame including the destination address malicious user may induce replicated or corrupted of sink, its routing agent refers to the routing table for information into the node which can impact the whole getting the next TN (node C) and informs back to its network/link to be malfunctioning. These “node MAC. The node B then transmits modified CTS frame capture attacks” occur due to the improper attention of to node C which changes its state to TN and other the wireless nodes and the high cost of fool-proof neighbor nodes become aware of the fact that they are hardware in portable devices. [21] The threats which NTN nodes. Otherwise the routing path is broken or are involved due to compromised (captured) node are has not yet been established. much more severe than the attacks from outside the The Proposed Key management scheme consists of network. As mobile nodes are autonomous and can join following phases: or leave any network at will, it is hard to keep track of i. Initial setup phase such nodes constantly. ii.Pre-distribution phase When a node is under attack or compromised, the iii Shared Key discovery phase keys are exposed to the intruders. Under such a iv.Path key establishment phase condition, other’s keys are also in a compromised state v. Rekeying Phase as these keys are also used by other nodes In this paper replay attack and node capture attacks A. Initial Setup are considered. Two keys, namely the Node key K and Network key NK are used in this scheme. The latter is utilized by the IV. PROPOSED KEY MANAGEMENT SCHEME individual sensor nodes for the encryption and The proposed Key management scheme is based on decryption purposes while the former is used by the the state of sensor nodes. State of sensor nodes are key server node to unicast the node keys to the sensor categorized in to three types as follows: Current nodes. transmitting node (CTN), Transmitting node (TN), Sensor nodes agree on the following system transmitting Node (CTN), Non transmitting Node parameters used in the protocol. The system parameters include 53 © 2010 ACEEE DOI: 01.ijns.01.02.10
  • 4. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 Global Key Pool: Defined as a pool of random and send to every sensor nodes symmetric keys from which a group key pool is generated. Keys are generated using one way function Commandnode → E NK ( INIT ) F, where n is chosen to be large. Once the INIT packet is received, a sensor node resets all previous keys. It then calculates new keys K K i = F ( Ki + 1) i = 1,2,3,...n i ,..., K1 from K i +1 . The subsequent key in the key- Group Key Pool: Defined as a subset of Global key sequence is broadcasted by the command node periodically with the aid of UPDATE control packet. pool for a given group. Key Ring: Defined as a subset of group key pool, The node keys are disclosed by the command node in a periodic manner from the to K all nodes in the which is independently assigned to each sensor node. L+2 Key-Sharing Graph: Let V represent all the nodes in group.At time T + T ,the server broadcasts start rekey WSN. A Key-Sharing graph G (V, E) is constructed in UPDATE packets containing K i + L + 2, i =1,2,....,n − the following manner: For any two nodes i and j in V, L − 2 ,Command node → group : E K i +1 ( K i + L + there exists an edge between them if and only if (1) 2) nodes i and j have at least one common key, and (2) Where Eki +1 is the active encryption key at the time nodes i and j can reach each other within the wireless when UPDATE packet is broadcasted. transmission range, i.e., in a single hop. The UPDATE packet is discarded once the node B. Key Pre-Distribution Phase detects that it is not from its own server. If not, the UPDATE packet is broadcasted to all the neighbors. This phase is performed off-line and before the deployment of sensor nodes. Primarily group key pools V. PERFORMANCE EVALUATION Gi (i = 1,2,..., k )) are produced using global key pool S. After this, for each sensor node in a group, a key A. Evaluation Metrics ring from a group key pool is Gi assigned along with a variable. In the proposed scheme following evaluation metrics are considered: C. Shared-Key Discovery Phase Connectivity: The probability that two sensors share This phase is used to find a secure link between two at least one common key at a given time-interval sensor nodes. Sensor nodes which identify its shared should be higher, with smaller number of keys. keys in their key rings, then verify that other CTN and Resilience against Node Capture: Exposing of the TN node contain these keys. Now the shared key turns secret information regarding other nodes should be out to be the key for that link. A key-sharing graph is made certain by the key establishment technique, if a created by the entire sensor networks following above node inside a sensor network is confined. step. The execution of the shared key discovery phase Any efficient key management scheme for WSNs is completed by a CTN node, if it finds out a TN node should have higher connectivity and stronger resilience as a neighbor. B. Numerical Results D. Path -Key Establishment Phase Connectivity Sensor nodes can form path keys with their neighbor It is defined as the probability ( Ps ) that two TN or nodes since they have not shared keys inside their key CTN state sensor nodes share atleast a common key rings. A path can be established from a source sensor after deployement at a given time interval. node to other CTN and TN sensor nodes, if the key- Let φ is the set of all sensor node groups and two sharing graph is connected. A path key can be nodes Ni and NJ are selected fromGj and Gi of φ . generated by the source node and send it safely using a The probability that Ni and N j are in TN state at given path to the target sensor node. time-interval, and two nodes share at least one common E. Re-keying Phase key is given by Ps. Using Baye’s Theorem, This Phase uses two control packetsand INIT UPDATE .The command node prepares a control packet INIT which contains INIT : ( L, K i +1, Trekey ), MAC(L, K i +1, Trekey ) L – length of the key Ki - initial key Where, P1 (Ti ) – – Probability of group G at a time i Trekey - Rekeying interval of Ki interval Ti P3 ( Sh) - - Probability that two nodes share This control packet is encrypted with network key NK at least one common key The probability that two nodes are in TN state at a 54 © 2010 ACEEE DOI: 01.ijns.01.02.10
  • 5. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 given time-interval Ti is calculated using [2006]. It is found that lesser number of keys is involved in the proposed scheme to achieve the same probability. i − a tm f p (ti m ) = e a C. Simulation Results _______________________________ (2) NS2 simulator is used for simulation with following specifications: x! • Maximum Number of nodes is 80 Therefore the active-probability of Gi at T can be • The deployment area is 500mx500 m. i • Simulation time is 100 seconds. found as follows • The transmission range of 250 meters with Constant Bit Rate (CBR). The proposed key management is applied with routing protocols DSDV, LEACH and PEGASIS and simulated to find resilience, energy consumed and end to end delay performance. Effects of Resilience against Node Capture An adversary can attack on a sensor node after it is deployed to read the information. To find how a successful attack on n sensor nodes by an adversary The probability that two nodes share at least one affects the rest of the network resilience is used. common key is expressed as Resilience is calculated from the fraction of communication among the uncompromised nodes that 1 − pr two sensors do not share any key]. (4) an adversary can compromise based on the information Consider retrieved from the n captured nodes. Using the routing Total size of each group = M protocols DSDV, LEACH, and PEGASIS, resilience is Shared keys = Sh(M ) measured for the proposed TKM scheme with varying Non-Shared keys = M − Sh(M ) number of nodes and attackers and compared with Let n1 , n 2 be two sensor nodes. When n1select x SHELL proposed by Mohemed F.Younis et al.[2006]. keys from keys Sh(M ) and y keys from M − Sh(M ) keys, then n2 select z keys from ( M − x) Keys. Resilience for various attackers Pr [two sensors do not share any key] is given by 1 0.8 DSDV-5 resilience 0.6 DSDV-10 0.4 DSDV-15 0.2 DSDV-20 0 20 40 60 80 nodes Figure 4.a.Resilence Vs Nodes-DSDV 1 0.8 Resilience for various Attackers Connectivity 0.6 TKM 0.4 Existing 1 0.2 0.8 LEACH-5 0 0.6 LEACH-10 resilience 25 50 75 100 120 0.4 LEACH-15 Keys 0.2 LEACH-20 0 Figure 3.Connectivity Vs No. of Keys 20 40 60 80 nodes Figure.3 gives the connectivity with respect to the varied number of keys in each sensor. The proposed scheme is compared with the existing random key pre- Figure 4.b.Resilence Vs Nodes-LEACH distribution scheme of Mohamed F. Younis et al.’s 55 © 2010 ACEEE DOI: 01.ijns.01.02.10
  • 6. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 Resilience For Varous Attackers 1 0.8 PEGASIS-5 Resilience 0.6 PEGASIS-10 0.4 PEGASIS-15 0.2 PEGASIS-20 0 20 40 60 80 Nodes Figure5.a. Energy Consumption Vs Nodes –DSDV Figure. 4.c.Resilence Vs Nodes-PEGASIS Energy For Various Attackers Resilience For Various Attacke rs 0.6 1.2 0.5 1 LEACH-5 SHELL-5 0.4 energy(j) resilience 0.8 LEACH-10 SHELL-10 0.3 0.6 LEACH-15 SHELL-15 0.2 0.4 LEACH-20 SHELL-20 0.1 0.2 0 0 20 40 60 80 20 40 60 80 nodes nodes Figure 5.b. Energy Consumption Vs Nodes –LEACH Figure 4.d.Resilence Vs Nodes-SHELL Figure 5.a shows the energy consumed with TKM- Figure 4.a shows the resilience with TKM using DSDV. With increase in the number of nodes from 20 routing protocol DSDV. With increase in the number of nodes to 80 nodes and increase in number of attackers nodes from 20 to 80 nodes and increase in number of from 5 attackers to 20 attackers the energy consumed is attackers from 5 to 20 attackers the resilience is reduced by 43% to 47% when compared with SHELL reduced by 55% to 61%. Figure 5.b shows the energy consumed with TKM- Figure 4.b shows the resilience with TKM using LEACH. Number of nodes is increased from 20 nodes routing protocol LEACH.With increase in the number to 80 nodes and the number of attackers is also of nodes from 20 to 80 nodes and increase in number of increased from 5 attackers to 20 attackers and it is attackers from 5 attackers to 20 attackers the resilience observed that the energy consumed is reduced by 58% is reduced by 79% to 81%. to 62% when compared with SHELL Figure 4.c shows the resilience with TKM using Figure 5.c shows the energy consumed with TKM routing protocol PEGASIS. With increase in the using routing protocol PEGASIS. With increase in the number of nodes from 20 to 80 nodes and increase in number of nodes from 20 nodes to 80 nodes and number of attackers from 5 to 20 attackers the increase in number of attackers from 5 attackers to 20 resilience is reduced by 86% to 88%. attackers the energy consumed is reduced by 69% to Figure 4.d shows the resilience with SHELL. With 71% when compared with SHELL increase in the number of nodes from 20 to 80 nodes and increase in number of attackers from 5 to 20 Energy For Various Attackers attackers the resilience is reduced only by 28% to 38%. 0.4 It is found from fig 4.a-e the performance of resilience is best in TKM-PEGASIS and hence more 0.3 PEGASIS-5 energy(j) secure when compared with TKM using LEACH, 0.2 PEGASIS-10 DSDV and SHELL. PEGASIS-15 0.1 PEGASIS-20 Effects of Energy Consumption against Node Capture 0 Energy consumed by the network is obtained by 20 40 60 80 varying total number of nodes and attackers with TKM nodes using routing protocols DSDV, LEACH and PEGASIS. Proposed TKM scheme is compared with SHELL. Figure 5.c. Energy Consumption Vs Nodes -PEGASIS 56 © 2010 ACEEE DOI: 01.ijns.01.02.10
  • 7. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 Energy For Various Attackers Delay For Various Attackers 1.4 1.2 0.8 1 SHELL-5 PEGASIS-5 0.6 energy(j) 0.8 SHELL-10 PEGASIS-10 Delay(s) 0.6 SHELL-15 0.4 0.4 PEGASIS-15 SHELL-20 0.2 0.2 PEGASIS-20 0 0 20 40 60 80 20 40 60 80 nodes Nodes . Figure 5.d. Energy Consumption Vs Nodes –SHELL . Figure 6.c.Delay Vs Attackers From figure 5.a to 5.d it is observed that TKM- PEGASIS consumes less energy for specific Delay For Various Attackers transmission when compared with TKM using LEACH, DSDV and SHELL. 1.75 1.7 SHELL-5 Delay(s) Effects of End to End Delay against Node Capture 1.65 SHELL-10 SHELL-15 Delay For Various Attackers 1.6 SHELL-20 1 1.55 0.8 DSDV-5 20 40 60 80 Delay(s) 0.6 DSDV-10 Nodes 0.4 DSDV-15 0.2 DSDV-20 Figure 6.d. Delay Vs Attackers 0 20 40 60 80 Nodes From figure 6.a-d it is observed that end to end delay is reduced more in TKM–PEGASIS when compared Figure 6.a. Delay Vs Attackers with TKM using LEACH, DSDV and SHELL. Figure 6.a shows that the end to end delay is reduced VI. CONCLUSION by 49% to 63% with TKM-DSDV when compared with The proposed scheme establishes shared keys for SHELL with increase in the number of nodes from 20 active sensor nodes which participate in direct nodes to 80 nodes and number of attackers from 5 to 20 communication, based on the topological information attackers. of the network. This scheme provides seamless re- Figure 6.b.shows that the end to end delay is reduced keying without disrupting the ongoing security process. by 54% to 61% with TKM-LEACH when compared Numerical results show that the proposed scheme with SHELL with increase in the number of nodes from achieves high connectivity. The simulation is 20 nodes to 80 nodes and number of attackers from 5 performed for the proposed scheme with different attackers to 20 attackers routing protocols. Performance analysis shows that Figure 6.c shows that the end to end delay is reduced proposed key management scheme TKM with by 61% to 65% with TKM-PEGASIS when compared PEGASIS achieves stronger resilience low energy with SHELL with increase in the number of nodes from consumption and lesser end to end delay when 20 nodes to 80 nodes and number of attackers from 5 compared with SHELL. attackers to 20 attackers. Delay For Various Attackers REFERENCES 1 [1] Wenliang DuJing DengHan, Y.S.Shigang Chen 0.8 LEACH-5 Varshney, P.K.“A Key Management Scheme for Delay(s) 0.6 LEACH-10 Wireless Sensor Networks Using Deployment 0.4 LEACH-15 Knowledge” INFOCOM 2004. Twenty-third 0.2 LEACH-20 AnnualJoint Conference of the IEEE Computer and 0 Communications Societies 7-11 March 2004. 20 40 60 80 [2] Alan Price, Kristie Kosaka and Samir Chatterjee “A Nodes Secure Key Management Scheme for Sensor Networks” Proceedings of the Tenth Americas Conference on Figure 6.b. Delay Vs Attackers Information Systems, New York, New York, August 2004. 57 © 2010 ACEEE DOI: 01.ijns.01.02.10
  • 8. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 [3] Siu-Ping Chan, Radha Poovendran and Ming-Ting Sun [10] A. Perrig, R. Canetti, D. Tygar, and D. Song. “The “A Key Management Scheme in Distributed Sensor TESLA Broadcast Authentication Protocol”. In RSA Networks Using Attack Probabilities” Global CryptoBytes, volume 5(2), pages 2–13, 2002 Telecommunications Conference, 2005.GLOBECOM [11] Charles E. Perkins, Elizabeth M. Royer “Ad hoc On '05. 28 Nov.-2 Dec. 2005 Demand Distance Vector Routing” Mobile Computing [4] Rui Miguel Soares Silva, Nuno Sidónio Andrade Pereira Systems and Applications, 1999. Proceedings. WMCSA and Mário Serafim Nunes "Chaos Based Key '99. Second IEEE Workshop on Publication Date: 25-26 Management Architecture for Wireless Sensor Feb 1999. Networks", Australian Telecommunication Networks [12] C.E. Perkins and P.Bhagwat. ”Highly Dynamic and Application Conference [ATNAC 2006], December Destination-Sequenced Distance-Vector routing (DSDV) 4-6, 2006. for mobile computers”. In Proceedings of the [5] Dijiang Huang, Manish Mehta, Deep Medhi and Lein SIGCOMM’94 conference on Communications, Harn “Location Aware Key Management Scheme for Architectures, Protocols, and Applications, August 1994. Wireless Sensor Networks” Proc. of 2004 ACM [13] David B. Johnson and David A. Maltz “Dynamic Source Workshop on Security of Ad Hoc and Sensor Networks Routing in Ad Hoc Wireless Networks” Wiley Series On (SASN'04), pp. 29-42, October 2004 Parallel And Distributed Computing, Pages: 425 – [6] An, F. Cheng, X. Rivera, J. M. Li, J. Cheng, Z. “PKM: A 450,Year of Publication: 2002 ISBN:0-471-41902-8. Pairwise Key Management Scheme for Wireless Sensor [14] Changsu Suh, Young-Bae Ko and Dong-Min Son, "An Networks” Lecture Notes In Computer Science 2005, Energy Efficient Cross-Layer MAC Protocol for Numb 3619, pages 992-1001. Wireless Sensor Networks," Proc. of the International [7] Jaemin Park, Zeen Kim, and Kwangjo Kim “State-Based Workshop on Sensor Networks (IWSN'06) in APWeb06, Key Management Scheme for Wireless Sensor Jan. 2006. (LNCS), Networks” Mobile Adhoc and Sensor Systems [15] Mohamed F. Younis , Kajaldeep Ghumman and Conference, 2005. IEEE International Conference on 7- Mohamed Eltoweissy “Location-Aware Combinatorial 10 Nov. 2005. Key Management Scheme for Clustered Sensor [8] K. Sanzgiri, Bridget Dahill, B. Levine, C. Shields, and E. Networks” , IEEE transactions on parallel and Belding-Royer.”Secure routing Protocol for Ad Hoc distributed systems, Vol. 17, No. 8, August 2006. Networks”. In Proceedings of the IEEE International Conference on Network Protocols, 2002 [9] Y. Hu, A. Perrig, and D. Johnson. “Ariadne: A secure on- demand routing protocol for ad hoc networks”. In Proceedings of the International Conference on Mobile Computing and Networking (MobiCom), 2002 58 © 2010 ACEEE DOI: 01.ijns.01.02.10