Chapter I INTRODUCTION. and potential, previous deployments and engineering issues that concern them, and the security

Similar documents
Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs

See discussions, stats, and author profiles for this publication at:

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

SUMMERY, CONCLUSIONS AND FUTURE WORK

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Comparative analysis of centralized and distributed clustering algorithm for energy- efficient wireless sensor network

Mobile Agent Driven Time Synchronized Energy Efficient WSN

On the Analysis of Expected Distance between Sensor Nodes and the Base Station in Randomly Deployed WSNs

Optimized Coverage and Efficient Load Balancing Algorithm for WSNs-A Survey P.Gowtham 1, P.Vivek Karthick 2

Chapter 1 Introduction

SECURED CLUSTERING IN WIRELESS SENSOR NETWORKS SAMIR GOKHALE. Bachelor of Engineering DAVV. Indore, India

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Routing protocols in WSN

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

Extending Network Lifetime of Clustered-Wireless Sensor Networks Based on Unequal Clustering

Performance Comparison of Energy Efficient Clustering Protocol in Heterogeneous Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *

A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network

A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

MESSCH PROTOCOL AN ENERGY EFFICIENT ROUTING PROTOCOL FOR WSN

Chapter 7 CONCLUSION

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CSC 774 Advanced Network Security

WSN Routing Protocols

Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network

Wireless Sensor Networks applications and Protocols- A Review

Wireless Sensor Networks CS742

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Cross Layer Detection of Wormhole In MANET Using FIS

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

An Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model. Zhang Ying-Hui

Distributive Energy Efficient Adaptive Clustering Protocol for Wireless Sensor Networks

Abstract. 1. Introduction

Network Decoupling: A Methodology for Secure

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS. A Thesis. Presented to. the Faculty of California Polytechnic State University

MOBILITY MODELS FOR NEXT WIRELESS NETWORKS GENERATION WILEY AD HOC, VEHICULAR AND MESH NETWORKS. Paolo Santi

Introduction and Statement of the Problem

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRATEGY IN WSNS

Wireless Sensor Networks --- Concepts and Challenges

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Fig. 2: Architecture of sensor node

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

A SECURED SECTOR BASED BI-PATH CLUSTERING AND ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK YIHONG ZANG. Master of Engineering. Southeast University

Hybrid Approach for Energy Optimization in Wireless Sensor Networks

Time Synchronization in Wireless Sensor Networks: CCTS

I. INTRODUCTION. Keywords: WSN, Data Aggregation, Cluster, LEACH algo.

SCH-BASED LEACH ALGORITHM TO ENHANCE THE NETWORK LIFE TIME IN WIRELESS SENSOR NETWORK (WSN)

Literature Survey on Energy Efficient Routing Protocols for Wireless Sensor Networks

Wireless Sensor Networks --- Concepts and Challenges

Energy Efficient Routing with MAX-LEACH Protocol in WSN

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Sowing Seeds Protocol based Key Distribution for Wireless Sensor Network

IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK

WIRELESS sensor networks (WSNs) have been

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Recent Design Optimization Methods for Energy- Efficient Electric Motors and Derived Requirements for a New Improved Method Part 3

Catching BlackHole Attacks in Wireless Sensor Networks

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

FORMULATION AND BENEFIT ANALYSIS OF OPTIMIZATION MODELS FOR NETWORK RECOVERY DESIGN

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

A Modified Clustering Algorithm in WSN

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples

The Best Keying Protocol for Sensor Networks

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs

Low Energy Adaptive Clustering Hierarchy based routing Protocols Comparison for Wireless Sensor Networks

FUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED HETEROGENEOUS WIRELESS SENSOR NETWORKS

CVLEACH: Coverage based energy efficient LEACH algorithm

System Identification Algorithms and Techniques for Systems Biology

Location-Based Pairwise Key Establishments for Static Sensor Networks

PEGASIS in WSN. Software Recommended: NetSim Standard v bit, Visual Studio 2015/2017, MATLAB 64 bit

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks

There into, Ei : Residual energy of each node in I round; Er : average energy of rest nodes in I round;

High Speed Data Collection in Wireless Sensor Network

MultiHop Routing for Delay Minimization in WSN

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

The Data Mining usage in Production System Management

Transcription:

Chapter I INTRODUCTION This thesis provides an introduction to wireless sensor network [47-51], their history and potential, previous deployments and engineering issues that concern them, and the security challenges that will have to be overcome before WSNs can be widely deployed. The major contributions of this research work are a) A new key pre-distribution and energy efficient routing protocol to WSNs that address their security concern. b) Assessing the use of asymmetric key [16] generation in general and that of hybrid routing approaches that can discover the secured link, increase the energy efficiency, increase the number of alive nodes and extend the network life time of WSN through the use of the Cluster Head Selection Algorithm to deliver data in a WSN. First motivation to work in this research area is the existence of key pre-distribution algorithm [13] in sensor network. Eschenauer and Gligor [32] was the first to address a probabilistic solution to this problem. Then Camtepe and Yener [19], Lee and Stinson [17] and many others proposed deterministic solution to this problem with the help of design theory. Ruj and Roy [6] was the first to provide a solution using Reed- Solomon code. Having successfully developed a novel key distribution algorithm in this research, the immediate motivation was to check this novel key distribution algorithm with other coding techniques having key distribution component in order to assess the resiliency of the novel coding algorithm. Second motivation is the Energy efficiency techniques which play a significant role in saving the energy. In general algorithm a node becomes a cluster-head by a stochastic mechanism of tossing biased coins. Hence non cluster-head nodes belonging to the hot regions, 1

which are expected to transmit frequently, dissipate more energy in transmitting data to a remote cluster-head located far. This leads to uneven energy dissipation over the network thereby reducing the network lifetime. Also it assumes that every time a node becomes a cluster-head, it dissipates an equal amount of energy. This is incorrect, as cluster-heads located far from the base station spend more energy in transmitting data than those nodes located near the base station. Thus, this research work has contributed an extended stochastic cluster head selection algorithm for network having spatio-temporal variations in data reporting rates across different region. 1.1 Scope The first goal of the research work discussed in this thesis is to explore the performance of novel key pre-distribution schemes for increasing the resiliency of the network. Asymmetric based key distribution schemes are introduced and analysed. The resiliency of the network is analysed by deploying sensor nodes in a square region and pre assigning keys to each sensor nodes for creating a link between nodes to transfer data. It presents the simulation results which demonstrate the number of compromised nodes in a network when some of the nodes in the network are captured by an attacker. The thesis describes these protocols for improving security in the sensor network. The second goal is to explore energy efficiency clustering approaches which increases the energy efficiency of the network. The sensor nodes are used to collect and report application-specific data to the sensor node, known as a sink node. Hierarchical routing protocols are best known for their energy efficiency. By using a clustering technique hierarchical routing protocol greatly minimize the energy consumed in collecting and distributing the data. The proposed protocol focuses on reducing the energy consumption and increasing the network life time of wireless sensor network. 2

1.2 Layout of Thesis This section illustrates how best the thesis should be read. Figure 1.1, gives the structure of the core chapters of the thesis, illustrating any structural dependencies between its different chapters. Material from earlier chapters will be required in order to fully comprehend these chapters. Chapter I- Introduction Chapter II-Overview of Wireless Sensor Network Chapter III- Literature Review Chapter IV- Design of key Management Schemes Chapter V-Design of Energy Efficient Protocols Chapter VI- Development of Key Pre-distribution and Energy Efficient Algorithm/Protocols Chapter VII-Simulation and Validation of Key Pre-distribution Chapter VIII -Simulation Analysis of Energy Efficiency Chapter IX- Epilogue Figure 1.1 Structure of Thesis 3

Chapter II Chapter II provides a general overview of Wireless Sensor Network-WSN, and introduces the main engineering challenges faced by WSN, such as the importance of energy efficiency, and the potential performance improvement needed for key pre-distribution protocols by analysing the previous sensor node platforms and deployments, and considering the essential characteristics that separate previous example deployments from typical research cases. This chapter explains the motivations which were instrumental in carrying out the work performed in this research work and reported in this thesis. Chapter III Chapter III presents a literature review which investigates in detail the security challenges facing wireless sensor network. It presents motivations for potential attack in different application scenarios. It defines essential fundamental properties of security in a system, together with the specific challenges for security engineering in WSNs. For example, given the energy limitations under which conventional WSNs operate, any individual device introduced by an attacker can often access resources beyond the capabilities of an individual node. It then presents taxonomy of common attacks within WSNs, and approaches that the literature has employed to mitigate them. The shortcomings and drawbacks of these approaches for realistic WSN deployments are used to motivate the work in the forthcoming chapters. Chapter IV and V Chapter IV and V explores a methodology to design protocols and implement practical WSN systems, and motivates simulation as important for the development of new network protocols, resulting from the high costs of deployments and the need for a consistent environment for testing. The simulation environments and specific software used for the 4

production of results within the thesis are analysed and motivated. The chapter then presents energy efficiency clustering and key distribution models that will be presented throughout the thesis in order to perform security over the network. Chapter VI In Chapter VI a model to discuss proposed energy efficient routing problem and key distribution scheme for wireless sensor network are established. The mechanism by which a routing policy would control the energy is studied which is a very critical and greatly restricted resource in wireless sensor network. A mathematical model to deal with the energy efficient routing problem in order to maximize the network life time, increase the energy efficient and increase the alive nodes base on the cluster head selection algorithm in the system is developed. Chapter VII and Chapter VIII The simulated output of energy efficiency and key predistribution scheme was discussed in these chapters. The results were compared with the existing other protocols and proves that the proposed method is best. Chapter IX Chapter IX concludes the thesis and provides a summary of the issues involved in security engineering, particularly within the energy-constrained domain of WSNs. The criteria for deployment of the particular schemes developed in the thesis are considered. The novel contributions contained within the thesis are summarised and their context within the literature is explained. Summary: This chapter discussed the snapshot view of the research work done as part of this Ph.D. work with chapter wise distribution of work details. 5