SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

Similar documents
SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER

WSN Routing Protocols

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL

PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI

Event Driven Routing Protocols For Wireless Sensor Networks

Study on Wireless Sensor Networks Challenges and Routing Protocols

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Review on an Underwater Acoustic Networks

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

COLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI

OPTIMIZED BURST ASSEMBLY ALGORITHM FOR MULTI-RANKED TRAFFIC OVER OPTICAL BURST SWITCHING NETWORK OLA MAALI MOUSTAFA AHMED SAIFELDEEN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Security of Mobile Ad Hoc and Wireless Sensor Networks

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Security Issues In Mobile Ad hoc Network Routing Protocols

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH

ENHANCEMENT OF UML-BASED WEB ENGINEERING FOR METAMODELS: HOMEPAGE DEVELOPMENT CASESTUDY KARZAN WAKIL SAID

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

HARDWARE-ACCELERATED LOCALIZATION FOR AUTOMATED LICENSE PLATE RECOGNITION SYSTEM CHIN TECK LOONG UNIVERSITI TEKNOLOGI MALAYSIA

Communication Layer, Attacks and Security Mechanisms of Wireless Sensor Network

Secured Routing Protocols for Wireless & ATM Networks : An Analysis

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Implementing Application Layer Algorithms to Improve Energy Efficiency of a Proprietary Wireless Sensor Network Routing Protocol

Selective Forwarding Attacks Detection in WSNs

A TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

Design Issues, Principles and Routing Challenges in Sensor Networks

The General Analysis of Proactive Protocols DSDV, FSR and WRP

Energy Aware Location Based Routing Protocols in Wireless Sensor Networks

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

ADAPTIVE LOOK-AHEAD ROUTING FOR LOW LATENCY NETWORK ON-CHIP NADERA NAJIB QAID AL AREQI UNIVERSITI TEKNOLOGI MALAYSIA

SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI

Multipath Routing Algorithm for Wireless Sensor Networks

ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING CONTROLLABLE INDEPENDENT DOUBLE GATES CHONG CHUNG KEONG UNIVERSITI TEKNOLOGI MALAYSIA

STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA

This item is protected by original copyright

HERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA

Key establishment in sensor networks

References. The vision of ambient intelligence. The missing component...

A Study on Issues Associated with Mobile Network

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN

Sleep/Wake Aware Local Monitoring (SLAM)

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI

World Journal of Engineering Research and Technology WJERT

CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks

A Literature survey on Improving AODV protocol through cross layer design in MANET

Introduction and Statement of the Problem

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

SUMMERY, CONCLUSIONS AND FUTURE WORK

Routing protocols in WSN

DYNAMIC TIMESLOT ALLOCATION TECHNIQUE FOR WIRELESS SENSOR NETWORK OON ERIXNO

ANOMALY DETECTION IN WIRELESS SENSOR NETWORK (WSN) LAU WAI FAN

A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER WALEED S. HASAN AL-HASAN UNIVERSITI TEKNOLOGI MALAYSIA

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA

LOW ENERGY CONSUMPTION RATEINHOME SENSORS USING PRIME NODES

Detection of Wormhole Attacks in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Wireless Sensor Networks: Security Issues, Challenges and Solutions

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

Routing in Ad-Hoc Networks

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Efficient Message Caching Scheme for MANET

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Lecture 8 Wireless Sensor Networks: Overview

CONCLUSIONS AND SCOPE FOR FUTURE WORK

Transcription:

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI A project report submitted in partial fulfillment of the Requirements for the award of the degree of Master Computer Science (Information Security) Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia JANUARY 2013

iii This dissertation is dedicated to my family and my friend for their and her endless support and encouragement.

iv ACKNOWLEDGEMENT First and foremost, I would like to express heartfelt gratitude to my supervisors Dr. Shukor Abd Razak and Dr. Anazida Zainal for their constant support during my study at UTM. They inspired me greatly to work in this project. Their willingness to motivate me contributed tremendously to our project. I have learned a lot from them and I am fortunate to have them as my mentors and supervisors Besides, I would like to thank the authority of Universiti Teknologi Malaysia (UTM) for providing me with a good environment and facilities such as Computer laboratory to complete this project with software which I need during process.

v ABSTRACT Routing protocols with supporting mobility is a new area that these years attract many researchers; different protocols made to support different applications and needs. The existing routing protocols with support mobility often designed with no security in mind; so later other researchers tried to add security function to these protocols. Adding new and extra functionality (even security) sometimes brings other vulnerability. The Secure-SPIN is a routing protocol with support mobility that branched from SPIN protocol; the Spin protocol has no security, but Secure-SPIN tries to add security to it. During this extra functionality, the Secure-SPIN keeps its vulnerability to eavesdropping as SPIN does. This thesis tries to secure Secure-SPIN with utilizing hash function (SHA1), and with separating encryption and hash function from each other try to add new security feature. With dividing hash and encryption less or same level of energy will be use. In this thesis, mathematical prove used To prove security of proposed protocol. The proposed solution use extra energy but the energy consumption is low enough to ignore the extra energy usage in tradeoff with more security.

vi ABSTRAK Protokol penghalaan yang menyokong mobiliti adalah satu bidang baru yang mana dapat menarik ramai penyelidik; protokol yang berbeza dibuat untuk menyokong aplikasi yang berbeza dan keperluan. Protokol penghalaan sedia ada yang menyokong mobiliti sering direka tanpa memikirkan keselamatan; oleh itu, penyelidik yang lain telah mencuba untuk menambah fungsi keselamatan ke dalam protokol ini. Penambahan baru dan fungsi tambahan (walaupun keselamatan) kadang-kadang membawa kepada kelemahan lain. Secure-SPIN adalah protokol penghalaan yang menyokong mobiliti yang dicabangkan daripada protokol SPIN. Protokol SPIN tidak mempunyai faktor keselamatan, tetapi Secure-SPIN cuba untuk menambah faktor keselamatan ke dalamnya. Semasa penambahan fungi ini, Secure- SPIN masih mempunyai kelemahan untuk mencuri dengar sama seperti SPIN. Tesis ini cuba untuk selamatkan Secure-SPIN dengan menggunakan fungsi hash (SHA1), dan dengan memisahkan penyulitan dan fungsi hash daripada satu sama lain untuk cuba menambah ciri-ciri keselamatan yang baru. Tenaga yang kurang atau sama aras telah digunakan untuk pembahagian hash dan penyulitan. Dalam tesis ini, pembuktian matematik digunakan untuk membuktikan keselamatan protokol yang telah dicadangkan. Penyelesaian yang dicadangan menggunakan tenaga yang lebih tetapi penggunaan tenaga tersebut cukup rendah untuk diabaikan berbanding penggunaan tenaga bagi mendapatkan keselamatan yang lebih.

vii TABLE OF CONTENTS CHAPTER TITLE PAGE ABSTRACT TABLE OF CONTENTS LIST OF FIGURES LIST OF TABLES LIST OF ACRONYMS III VII XI XII XIII 1 INTRODUCTION 1.1 Background of study 1 1.2 Statement of the problem 5 1.3 Purpose of study 6 1.4 Objective of the study 6 1.5 Research question 7 1.6 Scope of the study 7 1.6 Significance of the study 7 1.7 Organization Of Reports 8 2 LITERATURE REVIEW 2.1 Overview 9 2.2 Overview of WSN 9 2.2 Routing Challenges and Issues in Mobile WSN 10 2.2.1 Energy Consumption without losing accuracy 10 2.2.2 Scalability 11 2.2.3 Quality of service 11 2.2.4 Mobility 12

viii 2.2.5 Other Issues 14 a) Node Deployment 14 b) Data reporting method 15 c) Node/link heterogeneity 15 d) Fault tolerance 15 e) Network Dynamics 16 f) Coverage 16 2.3 Routing Protocols in WSN 17 2.3.1 Hierarchical Routing 17 2.3.1.1 Two-tier data dissemination (TTDD) 18 2.3.1.2 Sensor aggregates routing 18 2.3.2 Flat routing 19 2.3.2.1 Sensor Protocols for Information via Negotiation 19 2.3.2.2 Directed Diffusion 23 2.3.2.3 Gradient based routing 24 2.3.2.4 Active Qwery Forwarding in Sensor Networks (ACQUIRE) 25 2.3.3 Location-Based Routing Protocols 25 2.3.3.1 Geographic Adaptive Fidelity (GAF) 25 2.3.3.2 Geographic and Energy Aware Routing 26 2.3.3.3 SPAN 27 2.3.4 Comparison on existence routing 27 2.4 Secure Routing in wireless sensor network 29 2.4.1 Secure and energy-efficient multipath 29 2.4.2 SIGF 30 2.4.4 S-SPIN 31 2.4.5 Secure SPIN 31 2.4.6 Secure Data Collection and Critical Data Transmission Technique 32 2.5 Summary 34 3 RESEARCH METHODOLOGY 3.1 Overview 36 3.2 Research framework 37

ix 3.2.1 Phase 1: Study of current protocols and secure routing methods 37 3.2.2 Phase 2: searching for security 40 3.2.3 Phase 3: Testing and evaluation 41 3.3 Secure-SPIN with hash method 41 3.4 Summary 43 4 DESIGN OF SECURE-SPIN WITH USING HASH FUNCTION 4.1 Overview 44 4.2 SPIN-PP 44 4.3 Proposed design 45 a) Assumption 47 b) Notations 47 c) Detail of Secure-SPIN 48 4.3 Security analysis 51 4.4 Summary 53 5 EVALUATION AND COMPARISON 5.1 Overview 54 5.2 XOR weaknesses and attacks 55 5.3 The Secure SPIN weakness 57 5.4 Secure Data Collection and Critical Data Transmission 60 5.5 Using the hash function as a solution 60 5.6 Comparison 62 5.7 Mathematical proven 65 5.8 Evaluation 69 5.8.1 Attack scenario 1: Eavesdropping attack 69 5.8.2 Attack scenario 2: Sybil attack with reply attack 72 5.8.3 Attack scenario 3: Forge AC 74 5.9 Analysis of impact on energy consumption 76 A) AC energy usage 78

x B) PSAC energy usage 81 C) REQ & ADV energy usage 82 5.10 Summary 83 6 CONCLUSION 6.1 Overview 84 6.2 Achievements 84 6.3 Limitation 86 6.4 Future work 86 REFERENCES 87

xi LIST OF FIGURES FIGURE NO. TITLE PAGE Figure 2.1 Energy usage of nodes (Juang et al., 2002) 14 Figure 2.2 SPIN protocol (Abolhasan et al., 2004) 20 Figure 2.3 Mobility of sink in SPIN (Puthal, 2012) 21 Figure 2.4 Delivery ratio of mobile SPIN (Puthal, 2012) 22 Figure 2.5 Alive nodes/time of mobile SPIN (Puthal, 2012) 23 Figure 2.6 Energy usage of MSWSN (Puthal, 2012) 33 Figure 2.7 Vulnerabilities in MSWSN and Secure-SPIN 33 Figure 2.8 Literature review process 35 Figure 3.1 Research Framework... 38 Figure 3.2 Changes In Secure-Spin... 42 Figure 4. 1 Comparison of Secure-SPIN & Secure-SPIN with Hash Function 46 Figure 4.2 (First phase)... 49 Figure 4.3 Second and Third Phase... 51 Figure 5.1 Xor Function... 58 Figure 5.2 Ac In Secure-Spin... 63 Figure 5.3 Forge Ac... 76 Figure 5. 4 Number Of Packet Function... 77 Figure 5. 5 Xor Energy Usage... 78 Figure 5. 6 Hash Energy Usage Function... 78 Figure 5.7 Sending Ac Energy Usage... 80 Figure 5.8 Receiving Ac Energy Usage... 80 Figure 5.9 Sending Psac Energy Usage... 82 Figure 5.10 Receiving Psac Energy Usage... 82

xii LIST OF TABLES TABLE NO. TITLE PAGE Table 2.1 Routing protocols comparison table... 29 Table 5.1 Message Comparison... 63 Table 5.2 MICA2 characteristic Wander et al. (2005)... 77 Table 5.3 AC message in Secure-SPIN and Improved Secure- SPIN... 79 Table 5.4 PSAC message in Secure-SPIN and Improved Secure-SPIN... 81

xiii LIST OF ACRONYMS Acronym WSN SPIN AC PSAC REQ ADV DATA Description Wireless Sensor Network Sensor Protocol for Information via Negotiation Authentication Code Private Session Authentication Code Request Message Advertisement Message Data Message

CHAPTER 1 INTRODUCTION 1.1 Background of study New development in micro-electro-mechanical ran to new low power and integrated digital electronic that helped us to make disposable unattended sensors. This development has fueled new research in possible applications in past years about addressing the possibilities of association among processing and sensing ambient and managing the sensing activity and data flow that nodes send to sink (BS)(Akkaya & Younis, 2005). This researches described basic capabilities of wireless sensor network and needed features that make network layer of WSN more robust and secure (Al-Karaki & Kamal, 2004). Storage capacities, processing capabilities and energy of sensor nodes are narrow. Thus, they need careful resource management so make it compulsory to have energy-awareness in all protocol layer of a protocol stack. The problems associated to some layers (e.g. Physical and link layer) are common between applications and some researches focused only on system level power awareness capabilities like dynamic voltage scaling, radio communication hardware, low duty cycle issues, system positioning and energy-aware MAC Protocols. Network layer protocols goal is to find means for best energy-efficient routing protocol that will be reliable for communicating and expand life time of the network(al-karaki & Kamal, 2004).

2 Network layer is highly vulnerable to attacks and need to face with many security issues. There are many studies that consider security of routing protocols in WSN. Since the main purpose of those routing protocols was not security, improvements and studies to add security to them does not fulfill its job totally well. Attacks like selective forwarding, sinkhole attack, wormhole attack, Sybil attack, HELLO flood attack, ACK spoofing still make problems into sensor network(karlof & Wagner, 2003). Unsolved security problems are making a vast study area about security issues. Additional network that is similar to sensor network is ad-hoc network but sensor network in contrast to ad-hoc networks has a more communication outline. While the ad-hoc network usually supports routing between any pair of nodes. In WSN because of numerous features that differentiate Routing in wireless ad hoc network and modern wireless communication than wireless sensor networks, routing becomes more confusing. Some special communications like many-to-one or many-to-many connection is not feasible to use as a routing protocol in WSN. For example, many to one connection and redundancy flow that nodes make does not let us make global addressing scheme. Also in WSN routing protocols need to manage and exploit redundant flows to take care of scarce resources and basic constrains of Wireless Sensor nodes like transmission power, on-board energy, processing capacity and storage. Traffic in sensor networks can be categorized to one of the following categories: i. One-to-many : A node (usually the sink (BS)) broadcasts a query or multicast control information to some sensor nodes. ii. Many-to-one : nodes send data to aggregation node or base station iii. Local communication: communication between close nodes to synchronize or discover each other. It happens when a node broadcasts or unicast some query or data that only local nodes receive it.

3 It assumed that ad-hoc nodes have more constrain, but sensor nodes are still more limited than ad-hoc nodes. The most pressing of all of the resource constraints is energy limit. Nodes should be unattended after deployment and should be designed to work for a long time without battery replacement or recharging due to inaccessibility to nodes. It makes impossible or infeasible to replace or change nodes (Karlof & Wagner, 2003). When the mobility added to WSN, in resources, sensor nodes are more limited than ad-hoc network or MANETs, e.g. Battery limits the power in the sensor nodes, limited memory and limited processing capability of the sensor nodes, limited bandwidth etc. (Abolhasan, Wysocki, & Dutkiewicz, 2004). Topologies of mobile sensor network in contrast to MANET networks and ad-hoc network, due to frequent death of the sensor nodes are highly dynamic; Link failure always may happen (even while data is transmitting) because death of nodes due to no battery supply or busy node or collision or other events. This necessitates retransmission of data, and it causes more energy. Mobility of the sink and sensor nodes may cause link failure of various point-to-point links. Also, sensor node mobility produces station fading (a Physical Layer phenomenon). Data transmission and movement affect the performance of the network in terms of Bit Error Rate and Frame Error Rate. Heavy traffic over some nodes may cause quick reduction of energy in those nodes, which may initiate death of those nodes in the future and may cause network barrier. Another cause of early death of some nodes is unbalanced load in the sensor nodes.(deva Sarma et al., 2011) The differences in the characteristic of ad-hoc network prevent routing solution of other networks to be useful in wireless sensor network. Routing protocols with support of mobility does not have a good security protection in the network layer, and secure routing protocols support no mobility, or if they do, they support mobility limited. The secure routing in mobile wireless sensor network has overlooked. Unprepared nature of mobile network makes it hard to distinguish between untrusted and trusted nodes. Also, the dynamic nature of mobile networks makes it compulsory

4 for routing protocol to adapt itself to changes that happen so fast on the fly (Venkatraman & Agrawal, 2003). Moreover to design a good and robust secure routing protocol for mobile wireless sensor network, need to have security in mind, but the current available protocols do not consider security in network layer(sarma, Kumar, & Kar, 2011). The challenge is to get a satisfactory balance between security and performance, but constrains like energy, ram and process capability make valid methods in other networks an imperfect solution in wireless sensor network. Mobility of sensor nodes make confront of attacks harder than stable nodes to confront an attack; hence it is difficult to track down a node in a wide area. Also because of limits in energy it should be possible to add a new node to networks before the network die. To make it easy to deploy wide sensor network, new nodes need pre-configuration. These pre-configuration limit choices over cryptographic encryption. Constrain in one hand and pre-configuration in the other hand put a limit on possible encryption systems and sensor node characteristic; also it is possible for a node to be silent or be unattended for a period of the time, the node inattention increase the possibility of compromised key(hu & Sharma, 2005). Current protocols that support mobility are so limited and almost none of them designed with security in mind. SPIN is one of those protocols that support mobility, but it suffers from lack of security. There are some enhancements over SPIN protocol like Secure-SPIN and S-SPIN that both of them could not fulfill security goal perfectly. Problems in Secure SPIN make an empty area in the study about secure routing in mobile wireless sensor network.

5 1.2 Statement of the problem The SPIN protocol designed with no security in mind. There is some improvement over SPIN, like Secure SPIN (Xiao & Wei, 2006), S-SPIN (Tang & Li, 2009) and MSWSN (Puthal, 2012), which all of them tried to add security to SPIN. S-SPIN main Problem is focusing just on modeling, and the proposed model is vulnerable against Sybil attack. In S-SPIN, the encryption and the packet security method is unknown. The author tried to show how to prove security of a model without simulation. So security of proposed model is so basic that it cannot be reliable as a secure model. In Secure-SPIN, there is vulnerability in authentication method. In the initial phase, the sink generate an authentication code (AC) and broadcast it, then the sensor to authenticate itself, take the AC and XOR it with its own key which generate personal authenticate code (PSAC) and send it back to sink. This method is vulnerable against eavesdropping because the AC and PSAC both send through the air and an adversary easily can listen to them and decrypt it to get sensor key. MSWSN look like as promising routing protocol but since it derived from Secure-SPIN vulnerabilities carried into the protocol. The difference is that the PASC can be decrypt from ADV packet and impact of the vulnerability become so much higher than Secure-SPIN. In Secure-SPIN adversary only can find sensor key, but if the adversary listen to ADV packets, it also can decrypt key of Sink and nodes that are share between all nodes of network (Puthal, 2012).

6 1.3 Purpose of study Wireless sensor network usage is growing in many part of modern life. The application that has different usage in Military or applications that have an impact on daily life like weather control systems is growing every day. Sensor nodes are a new concept that will affect daily life and for sure security is one crucial part of it (Huang, Bai, & Chen, 2007). Network layer security can strengths the reliability of sensor network since many attacks happen in the network layer. In sensor nodes, data transmission happen through air so the intruder can eavesdrop or act as a malicious router. This will stop packets delivery to destination and decrease reliability of the network. There are many researches to give security to available routing protocols. Also, the existing routing protocols with support mobility often designed with no security in mind; so later other researchers tried to add security function to these protocols. Extra and new functionality (even security) sometimes bring other vulnerability. The Secure-SPIN is a routing protocol with support mobility that branched from SPIN protocol; the Spin protocol has no security, but Secure-SPIN tries to add security to it. During this extra functionality, the Secure-SPIN keeps its vulnerability to eavesdropping as SPIN does. The purpose of this study is to solve vulnerabilities of secure-spin to have more security than existing one. 1.4 Objective of the study The objectives of this study are: i. To evaluate the current vulnerabilities of existing Secure-SPIN protocol. ii. To propose improved Secure-SPIN protocol using the hash function iii. To evaluate the proposed protocol in terms of security and energy efficiency.

7 1.5 Research question How to secure Secure-SPIN against eavesdropping? How to secure Secure-SPIN against forged AC? How to have security in all messages of Secure-SPIN? 1.6 Scope of the study This study will focus on secure routing in mobile wireless sensor network to propose an enhancement for Secure-SPIN. i. Secure-SPIN (original) and Improved Secure-SPIN will be check and validate. ii. Security will consider mathematically. 1.7 Significance of the study This study by study and evaluate existing solutions and focus on one or more characteristic of routing needs make it easier for further development in secure routing in mobile wireless sensor network. Also, this study will aggregate the common ability of various security function in wireless sensor network, and clear different vulnerabilities in Secure- SPIN to help easier understanding to design middle-ware and routing protocol that add two heterogeneous network to each other. Moreover this study can be applied to other routing protocols.

8 1.8 Organization of Reports Rest of this thesis organized as follow: Chapter 2 provides a review of related works, conclude reasons about SPIN and describe how it fulfills requirements in mobile sensor network. At end secure protocols and especially secure method proposed for SPIN reviewed. SPIN. Chapter 3 provides the frame-work and methodology to improve the Secure- Chapter 4 provides the design of proposed improved protocol. During design, the theme of Secure-SPIN for better understanding preserved. Chapter 5 provides the improved protocol with hash function compared with Secure-SPIN. The differences and benefit. Also, the attack scenario explained and described how the new proposed method mitigates those vulnerabilities. At the end, the impact of the proposed method on energy consumption discussed. Chapter 6 provides discussion about limitations and future work and the effectiveness of the newly proposed model.

87 REFERENCES Abolhasan, M., Wysocki, T. & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad hoc networks, 2(1), 1 22. Elsevier. Albath, J. & Madria, S. (2007). Practical algorithm for data security (PADS) in wireless sensor networks. Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access, 9 16. Albath, J. & Madria, S. (2009). Secure hierarchical data aggregation in wireless sensor networks. Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE, 1 6. Ashraf, A., Hashmani, M., Chowdhry, B. S., Mussadiq, M., Gee, Q. & Rajput, A. Q. K. (2008). Design and analysis of the security assessment framework for achieving discrete security values in wireless sensor networks. Electrical and Computer Engineering, 2008. CCECE 2008. Canadian Conference on, 000855 000860. Hexmoor, H., Bhattaram, S. & Wilson, S. (2004). Trust-Based Security Protocols. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L. S. & Rubenstein, D. (2002). Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. ACM Sigplan Notices, 37(10), 96 107. Kazatzopoulos, L., Delakouridis, C., Marias, G. & Georgiadis, P. (2006). ihide: Hiding sources of information in wsns. Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006. SecPerU 2006. Second International Workshop on, 8 pp. Marinescu, D. C., Yu, C. & Marinescu, G. M. (2008). A secure self-organizing sensor network. Self-Adaptive and Self-Organizing Systems Workshops, 2008. SASOW 2008. Second IEEE International Conference on, 114 119.

88 Quan, Z. & Jiuhao, L. (2009). Secure routing protocol cluster-gene-based for wireless sensor networks. Information Science and Engineering (ICISE), 2009 1st International Conference on, 4098 4102. Stent, S. (2009). A Security Framework for Wireless Sensor Networks. Communication and Networking, 444 454. Springer. Tubaishat, M., Yin, J., Panja, B. & Madria, S. (2004). A secure hierarchical model for sensor network. ACM SIGMOD Record, 33(1), 7 13. ACM. Wang, C., Sohraby, K., Li, B., Daneshmand, M. & Hu, Y. (2006). A survey of transport protocols for wireless sensor networks. Network, IEEE, 20(3), 34 40. IEEE. Wen, S., Du, R. & Zhang, H. (2006). A Segment Transmission Secure Routing Protocol for Wireless Sensor Networks. Computational Intelligence and Security, 2006 International Conference on, 2, 1579 1582. Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325-349. Retrieved from http://www.sciencedirect.com/science/article/pii/s1570870503000738 Al-Karaki, J. N., & Kamal, A. E. (2004). Routing techniques in wireless sensor networks: a survey. Wireless Communications, IEEE. doi:10.1109/mwc.2004.1368893 Awwad, S. A. B., Ng, C. K., Noordin, N. K., & Rasid, M. F. A. (2011). Cluster Based Routing Protocol for Mobile Nodes in Wireless Sensor Network. Wireless Personal Communications, 61(2), 251-281. Retrieved from http://dx.doi.org/10.1007/s11277-010-0022-8 Camilo, T. and Silva, J.S. and Boavida, F. (2006). Assessing the use of ad-hoc routing protocols in Mobile Wireless Sensor Networks. Proc. CSMU. Cao, Z., Hu, J., Chen, Z., Xu, M., & Zhou, X. (2008). FBSR: feedback-based secure routing protocol for wireless sensor networks. International Journal of Pervasive Computing and Communications, 4(1), 61-76. doi:10.1108/17427370810873110 Deva Sarma, H. K., Kar, A., & Mall, R. (2011). Energy efficient routing protocol for Wireless Sensor Networks with Node and Sink mobility. 2011 IEEE Sensors Applications Symposium, 239-243. Ieee. doi:10.1109/sas.2011.5739777 Hosseini Seno, S. A., Budiarto, R., & Wan, T.-C. (2011). A routing layer-based hierarchical service advertisement and discovery for MANETs. Ad Hoc

89 Networks, 9(3), 355-367. Retrieved from http://www.sciencedirect.com/science/article/pii/s157087051000082x Hu, F., & Sharma, N. K. (2005). Security considerations in ad hoc sensor networks. Ad Hoc Networks, 3(1), 69-89. doi:10.1016/j.adhoc.2003.09.009 Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: a link layer security architecture for wireless sensor networks. Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 162-175). New York, NY, USA: ACM. doi:10.1145/1031495.1031515 Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 1(2 3), 293-315. Kumar, H., & Sarma, D. (2009). Energy Efficient Communication Protocol for a Mobile Wireless Sensor Network System, 9(2), 386-394. Li, X., & Nayak, A. (2010). Sink mobility in wireless sensor networks. Sensor and Actuator Networks. Retrieved from http://onlinelibrary.wiley.com/doi/10.1002/9780470570517.ch6/summary Luo, H., Ye, F., Cheng, J., Lu, S., & Zhang, L. (2005). TTDD: Two-Tier Data Dissemination in Large-Scale Wireless Sensor Networks. Wireless Networks, 11(1-2), 161-175. Springer. doi:10.1007/s11276-004-4753-x Nasser, N, Al-Yatama, A., & Saleh, K. (2012). Zone-based routing protocol with mobility consideration for wireless sensor networks. Telecommunication Systems. Department of Information Science, College for Women, Kuwait University, P.O. Box: 5969, Safat, 13060, Kuwait. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84857732792&partnerid=40&md5=c3284c210b091153c49f0f7d9522338b Nasser, Nidal, & Chen, Y. (2007). SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. Computer Communications, 30(11 12), 2401-2412. Retrieved from http://www.sciencedirect.com/science/article/pii/s0140366407001727 Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: security protocols for sensor networks. Wirel. Netw., 8(5), 521-534. Hingham, MA, USA: Kluwer Academic Publishers. doi:10.1023/a:1016598314198 Puthal, D. (2012). Secure data collection and critical data transmission technique in mobile sink wireless sensor networks.

90 Routing Protocols for Ad Hoc Mobile Wireless Networks. (2004). Retrieved from http://www.cse.wustl.edu/~jain/cis788-99/ftp/adhoc_routing.pdf Sarma, D., Kumar, A., & Kar, B. (2011). Secure Routing Protocol for Mobile Wireless Sensor Network. Symposium (SAS), 2011. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5739778 Tang, L., & Li, Q. (2009). S-SPIN: A Provably Secure Routing Protocol for Wireless Sensor Networks. 2009 International Conference on Communication Software and Networks, 620-624. Ieee. doi:10.1109/iccsn.2009.8 Venkatraman, L., & Agrawal, D. P. (2003). Strategies for enhancing routing security in protocols for mobile ad hoc networks. Journal of Parallel and Distributed Computing, 63(2), 214-227. doi:10.1016/s0743-7315(02)00065-5 Wood, A. D., Fang, L., Stankovic, J. A., & He, T. (2006). SIGF: a family of configurable, secure routing protocols for wireless sensor networks. Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks (pp. 35-48). New York, NY, USA: ACM. doi:10.1145/1180345.1180351 Xiao, D., & Wei, M. (2006). Secure-spin: Secure sensor protocol for information via negotiation for wireless sensor networks. Industrial Electronics and, (c), 1-4. Ieee. doi:10.1109/iciea.2006.257149 Abolhasan, M., Wysocki, T. & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad hoc networks, 2(1), 1 22. Elsevier. Huang, Q., Bai, Y. & Chen, L. (2007). An efficient route maintenance scheme for wireless sensor network with mobile sink. Vehicular Technology Conference, 2007. VTC2007-Spring. IEEE 65th, 155 159. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L. S. & Rubenstein, D. (2002). Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. ACM Sigplan Notices, 37(10), 96 107. Potlapally, N. R., Ravi, S., Raghunathan, A. & Jha, N. K. (2003). Analyzing the energy consumption of security protocols. Proceedings of the 2003 international symposium on Low power electronics and design, 30 35. Wander, A. S., Gura, N., Eberle, H., Gupta, V. & Shantz, S. C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on, 324 328.

91 Wang, C., Sohraby, K., Li, B., Daneshmand, M. & Hu, Y. (2006). A survey of transport protocols for wireless sensor networks. Network, IEEE, 20(3), 34 40. IEEE.