INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Similar documents
An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks

A Reliable Routing Technique for Wireless Sensor Networks

In-Network Aggregation in Wireless Sensor Network

EERDC:Energy Efficient Routing using Dynamic Cluster approach

A Review on Routing Protocols for In-Network Aggregation in Wireless Sensor Networks

MultiHop Routing for Delay Minimization in WSN

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

An Improved Chain-based Hierarchical Routing Protocol for Wireless Sensor Networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

A Review of Energy Efficient In-network Data Aggregation Protocols

An Efficient Approach for Data Aggregation Routing using Survival Analysis in Wireless Sensor Networks

.Institute of Technology,Bangalore, India. 4 Principal, University Visvesvaraya College of Engineering, Bangalore, India.

International Journal of Advance Research in Computer Science and Management Studies

Survivability Evaluation in Wireless Sensor Network

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

Balanced Load Sharing Protocol for Wireless Sensor Networks

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication

Part I. Wireless Communication

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN

Energy Efficient Clustering Protocol for Wireless Sensor Network

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Security of Mobile Ad Hoc and Wireless Sensor Networks

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

Improvement of Traffic System of Distributed Architecture in Wireless Sensor Networks by Entropy Calculation

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Identifying Packet Loss In Wireless Sensor Network

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Selective Forwarding Attacks Detection in WSNs

A Framework based on Small World Features to Design HSNs Topologies with QoS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

A ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

Selection of Optimum Routing Protocol for 2D and 3D WSN

An Energy Efficient Cluster based Load Balance Routing for Wireless Sensor Network

I. INTRODUCTION. Keywords: WSN, Data Aggregation, Cluster, LEACH algo.

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

ISSN: [Powar * et al., 7(6): June, 2018] Impact Factor: 5.164

Energy Efficient Approach for In-Network Aggregation in Wireless Sensor Networks

Lifetime Enhancement of Wireless Sensor Networks using Duty Cycle, Network Coding and Cluster Head Selection Algorithm

Event Driven Routing Protocols For Wireless Sensor Networks

Accepted 10 May 2014, Available online 01 June 2014, Vol.4, No.3 (June 2014)

Energy Efficient Protocols in Wireless Sensor Networks: A Survey

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

A Real-Time MATLAB based GUI for node placement and a shortestpath alternate route path algorithm in Wireless Sensor Networks

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation

Robust Data Dissemination in Sensor Networks

Implementation of enhanced REAC-IN protocol

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Reliable Time Synchronization Protocol for Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

An energy efficient routing algorithm (X-Centric routing) for sensor networks

Abstract. 1. Introduction

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Abstract. Figure 1. Typical Mobile Sensor Node IJERTV2IS70270

Reservation Packet Medium Access Control for Wireless Sensor Networks

Energy Efficient Aggregation in Wireless Sensor Networks with. Some Selfish Nodes

Backbone Discovery In Thick Wireless Linear Sensor Netorks

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

An Energy Efficient Intrusion Detection System in MANET.

Geographical Grid Based Clustering for WSN

Sensors & Transducers Published by IFSA Publishing, S. L.,

Demand Multipath Routing Protocol with Network Lifetime Maximization in Wireless Sensor Network Fixed Routing Function

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

Figure 1. Clustering in MANET.

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Energy Efficient Routing Protocols in Wireless Sensor Network

Reliable Broadcast Message Authentication in Wireless Sensor Networks

An Energy Efficient Clustering in Wireless Sensor Networks

Cluster Head Selection using Vertex Cover Algorithm

Data Routing in In-network Aggregation in WSN: a Cluster Based approach

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication

Time Synchronization in Wireless Sensor Networks: CCTS

An Innovative Approach to increase the Life time of Wireless Sensor Networks

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 02, 2016 ISSN (online):

A review on Coverage factors in Wireless Sensor Networks

INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

CSMA based Medium Access Control for Wireless Sensor Network

Transcription:

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK DRINA: A SECURE CLUSTERING ALGORITHM POONAM V. SADAFAL, RAHUL C. SALUNKHE Dept. of Information Technology, Sinhgad Institute of Technology & Science, Narhe, Pune-41 Accepted Date: 15/03/2016; Published Date: 01/05/2016 Abstract: Wireless sensor network consist of spatially isolated autonomous sensors to monitor physical or environmental conditions and to considerately pass their data through the network to a sink node. Mostly monitored conditions are temperature, sound, pressure etc. Wireless sensor network have many civilian application areas which include environment and healthcare applications, home automation, and habitat monitoring and traffic control. Security is major concern in all these applications. As the information provided by the networks has been increased, there is a need for secure transmission of information. Most wireless sensor network actively monitor their environment and it is often easy to presume information other than data monitored. There are various clustering algorithm was developed for wireless sensor network for data transmission. However, in all clustering algorithm, the security issues are not consider. In this paper we explore the existing DRINA algorithm along with security mechanism. DRINA is routing protocol which is designed for data aggregation. The key aspect of DRINA is data synchronization among the nodes. In DRINA \ security constraint is not considered. In order to achieve the security, in this paper we implement the security mechanism in existing DRINA algorithm. Keywords: Security, clustering, Routing, DRINA, WSN Corresponding Author: MS. POONAM V. SADAFAL Access Online On: www.ijpret.com How to Cite This Article: PAPER-QR CODE 874

INTRODUCTION Security plays an important role in wireless sensor network. Wireless sensor network was highly motivated by military applications such as battlefield surveillance, where the security is most important. Each time attackers are attempting to gain and detect as much as information about enemy movement in military sensor network. In this paper we have used DRINA clustering algorithm for routing the data and for secure data transmission, we are providing security to it using RSA algorithm. Drina: data routing for in-network aggregation for wsn Energy Consumption is key issue in WSN. In order to save energy redundant data detected by nodes should be aggregated at middle nodes while sensing an event, reducing the size and number of exchanged messages and, thus, decreasing communication costs and energy consumptions. DRINA is routing protocol. The main aim of DRINA is to build a routing tree and discover the shortest path which connects all source nodes to the sink node, while maximizing the data aggregations. In DRINA following roles of nodes are consider for constructing the routing tree. 1. Collaborator: - The node which detects an event and sends the collected data to the Coordinator node. 2. Coordinator: - a node that also detects an event and is responsible for collecting all the gathered data sent by collaborator nodes, aggregating them and sending the aggregated data to sink node; 3. Relay node: It is intermediate node between coordinator and sink node, and forwards the data to the sink. Sink Node: A node which is involved in getting the data from set of coordinator nodes & collaborator node DRINA algorithm is divided into three stages. Constructing Hop tree from sensor nodes to the sink node. Grouping Cluster and selecting cluster head among collaborator nodes. Routing the data towards to a sink node implementing security in Drina 875

The main aim of DRINA is to connect all nodes to sink node with shortest path while increasing the data aggregation. However it does not have security mechanism for data transmission. There is a need for secure transmission of information, as the information provided by networks has been increased. Several cryptographic and steganographic techniques are used in order to achieve security in wireless sensor networks. In this paper Secure DRINA algorithm is implemented. To achieve the security in existing DRINA algorithm, Public key cryptography (RSA) algorithm is used and for message digest SHA algorithms is used. The RSA is Public key cryptography algorithm. Using RSA algorithm, user can creates the product of two large prime numbers, along with a supplementary value, as their public key. SHA-1 is a cryptographic hash function which calculates 160 bit hash, value which is expressed as hexadecimal number. Using this two algorithms attacker not able to read and change the data. system model At this point first of all the false data sent by sensing node to the sink node is calculated. Let t nodes are attacker nodes in total m nodes so the probability of node being attacker is given by P (A) = t/m (1) Assuming every attacker node sends the false data; if attacker node is coordinator then all data go through attacker node is false data, so false data sent is Dfalse = D (FI) + D (FC) (2) Where, D (FI), Data false send by individual node. D (FC), data goes through attacking coordinator. False Data sent by individual node is given by, D (FI) = P (A)*SR = (t/m)*sr (3) Where, SR= sensing rate Probability of attacker as coordinator is given by P (FC) = P (A)*P (C) (4) Where P(C) is probability of being coordinator 876

P(C) = 1/N (5) Where, N is number of neighbor. Putting (1) and (5) in equation (4) P (FC) = t/m *(1/N) = t/ (m*n) (6) Probability of attacking coordinator on path of length l is given by Pt (FC) = P (FC)*l = tl/(m*n) (7) So false data send by coordinator (as data coming from loyal node to attacking coordinator is also falsely forwarded) N D (FC) = Pt (FC)*Σ ((1-P (A))*SR) k=0 N D (FC) = t1 (m*n)*σ ((1-t/m)*SR) (8) k=0 By putting (3) and (8) into (2) will get total false data sent as Dfalse = (t/m)*sr+ (t1/ (m*n))*σ ((1-t/m)*SR) N k=0... (9) The equation no. (9) will give us amount of false data sent by coordinator. In proposed method, data is encrypted before transmitting to sink node as: DT= E (Kpb, E( Kpr, SD)) Where, E is public key encryption function 877

Kpb is public key of sink node. Kpr is private key of Sensing Node Because of above encryption, attacking coordinator node can t read data and send data with other nodes identity. Attacker nodes are still able to send false data, so total false data coming to sink is Dfalse = (t/m)*sr (10) The equation no. (10) is improved than existing system. simulation result For simulation of an algorithm OMNET++ is used.the nodes are placed randomly in given area. simulation parameter Parameters Value Numbers of nodes 20 Number of Attacking nodes 02 Number of sinks 1 Initial Energy Transmission power Receive power MAC Routing Protocol 18720 J 62mW 62mW Bypass MAC DRINA Fig 5.1 and 5.2 shows energy consumption of nodes in existing DRINA and in secure DRINA. This result shows that energy consumed by nodes in Existing DRINA algorithm is not much vary in secure DRINA. 878

Fig 5.1: Energy level of nodes in Existing DRINA Fig 5.2: Energy level of nodes in Secure DRINA Fig 5.3: Energy consumed v/s number of false packet detected in Secure DRINA Fig 5.3 shows the energy consumed and number of false packets detected by node 4 in secure DRINA 879

CONCLUSION Wireless sensor networks (WSNs) have attracted considerable attention over the past few years. In military and civil application WSN is widely used; especially in hostile and remote areas. Examples include combat field surveillance, disaster management, and border protection. In all these applications a large number of sensors are expected, requiring careful planning and management of the network. In previous clustering algorithm security was not considered. In this paper we presented secure DRINA algorithm. Our secure DRINA algorithm was extensively compared to existing DRINA algorithm regarding security, energy consumption, communication costs, delivery efficiency, and aggregation rate and aggregated data delivery rate. REFERENCES 1. Azzedine Boukerche, Heitor S. Ramos Horacio A. B. F. de Oliveira, Regina B. de Araujo and Antonio A. F. Loureiro, DRINA: A Lightweight and Reliable Routing Approach for in-network Aggregation in Wireless Sensor Networks Leandro Villas, 2012 IEEE. 2. L. Villas, A. Boukerche, R. B. de Araujo, and A. A. F. Loureiro, Highly dynamic routing protocol for data aggregation in sensor networks, in Proceedings of the IEEE symposium on Computers and Communications, ser. ISCC 10. Washington, DC, USA: IEEE Computer Society, 2010. 3. H. S. AbdelSalam and S. Olariu, A lightweight skeleton construction algorithm for selforganizing sensor networks. in ICC. IEEE, 2009. 4. Boukerche, Algorithms and Protocols for Wireless Sensor Networks. Wiley-IEEE Press, 2008. 5. G. Anastasi, M. Conti, M. Francesco, and A. Passarella, Energy conservation in wireless sensor networks: A survey, Ad Hoc Networks, vol. 7, no. 3, pp. 537 568, May 2009. 6. Ameer Ahmed Abbasi Mohamed Younis A survey on clustering algorithms for wireless sensor networks, Department of Computing, Al-Hussan Institute of Management and Computer Science,Dammam 31411,Saudi Arabia Department of Computer Science and Electrical Engineering, University of Maryland,Baltimore County, Baltimore, MD 21250, USA,21 June 2007. 7. Dirk WESTHOFF, Joao GIRAO, Security Solutions for Wireless Sensor Networks Amardeo SARMA NEC TECHNICAL JOURNAL Vol.1 No.3/2006. 8. S. Olariu, Q. Xu, and A. Zomaya, An energy-efficient self-organization protocol for wireless sensor networks, in Intelligent Sensors, Sensor Networks and Information Processing Conference (ISSNIP).Melbourne,Australia: IEEE, December 2004. 9. E. F. Nakamura, H. A. B. F. de Oliveira, L. F. Pontello, and A. A. F. Loureiro, On demand role assignment for event-detection in sensor networks, in ISCC 06: Proceedings of the 11th IEEE 880

Symposium on Computers and Communications. Washington, DC, USA: IEEE Computer Society, 2006. 10. G. Gaubatz, J.-P. Kaps, and B. Sunar. Public key cryptography in sensor networks revisited in 1 st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2004. 881