Secure Data Dissemination Protocol in Wireless Sensor Networks Using Xor Network Coding
Secure Data Dissemination Protocol in Wireless Sensor Networks Using Xor Network Coding
Abstract
Wireless sensor networks (WSN) are basically distributed networks or a collection of sensor nodes which collect information
which are used to analyse physical or environmental conditions. WSNs are usually setup in remote and hostile areas and work in
extreme conditions. Applications of WSN include habitat monitoring, industrial applications, battlefield surveillance, smart homes
etc. Most of them require regular updating of software in sensor nodes through the wireless channel for efficient management and
working. So it is necessary to spread data through the wireless medium after the nodes are deployed. This is known as data
dissemination or network reprogramming. A good data dissemination protocol must be fast, secure, reliable and energy efficient.
To achieve these we can make use of network coding techniques which reduces the number of retransmissions due to any packet
drops. But network coding increases the chance of various kinds of network attacks. Also to avoid spreading of malicious code in
the network, each sensor node has to authenticate its received code before propagating it further. So here a novel dissemination
protocol is introduced based on simple cryptographic techniques which prevents pollution and DoS attacks and at the same time
achieves fastness using the technique of network coding.
Keywords: wireless sensor network; dissemination; reprogramming; network coding; security; pollution attack.
--------------------------------------------------------------------***---------------------------------------------------------------------1. INTRODUCTION
Wireless Sensor Networks (WSN) is one of the major
milestones in the field of communication. These networked
collection of nodes take us a step closer to obtaining
valuable information about the physical world. WSN are
used popularly in many applications like remote control and
monitoring, construction safety systems, environmental
monitoring, health care management, disaster management,
surveillance operations, smart homes, habitat monitoring,
indoor sensor networks, seismic monitoring of buildings etc
[1]. In computer science and communication wireless sensor
networks entertain lot of research today.
A WSN is made of sensor nodes used for monitoring and
analysis purposes as shown in Fig 1. These sensor nodes
pass the information that they collect to a prime location
called a base station. In most systems, a WSN
communicates with a LAN or WAN through a gateway like
medium. The gateway is actually a bridge between the WSN
and the various other networks [2]. This allows data to be
stored by devices and which can be taken up for processing
later. Each sensor node or mote has several parts: a circuit
for interfacing with other sensor nodes, a micro controller, a
radio transceiver, and a battery for power supply. The
topology used can be either a star, ring, grid network or
multi-hop wireless mesh network.WSN is used primarily in
remote and hostile environments for information collection.
Hence it is a major challenge to produce cheap sensor nodes.
They must be designed carefully by considering all the
different constraints of the environment in consideration.
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org
57
2. RELATED WORKS
Data dissemination in wireless sensor networks is a critical
and vital task. It is based on the concept of traditional
communication system, where we have a sender and
receiver. The scenario is basically a sender sending out
some information, and receiver collecting the information
sent, processing it and sending some information back.
While in data dissemination, only half of this concept is
applied. Some information is sent out and received at the
destination, but no reply is given back. The sender sends out
information, not to one node, but to many as in a
broadcasting system.
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org
58
4. PROPOSED SYSTEM
In this protocol data dissemination is done in a secure and
fast way by using the techniques of network coding and
cryptography. Network coding reduces the number of
retransmissions due to any packet losses happening in the
network by combing and sending data. Also data
disseminated is always sent as encrypted data. For this
nodes first perform node to node authentication and
establish session keys. Then the session key is used for
encrypted transfer of data. This protocol ensures that the
system is free of pollution [13] and Denial-of-Service
attacks. The different phases of this protocol include:
(1)
2.
(2)
3.
h = MMH ( a[i] )
(3)
4.
(4)
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org
59
If this packet is also validated, then the two nodes are ready
to generate a session key. The key is generated as:
Session key = Km XOR Ka XOR Kb
(5)
(6)
(7)
2.
Result = ADD(Hash)
(8)
makes sure that only valid data is sent out and data is been
sent out safely.
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org
60
[7]
[8]
[9]
[10]
Chart 1: Comparison of data messages disseminated
7. CONCLUSION
This paper proposes a novel data discovery and
dissemination protocol for wireless sensor networks which
can be used to achieve secure and fast data dissemination
especially for small configuration parameters and variables.
This technique combines the concepts of network coding
and simple cryptographic techniques so as to disseminate
data. The advantages of this protocol are that it is resistant to
pollution attacks, and achieves immediate authentication of
data been disseminated. Session keys are used to encrypt
and send data between nodes and there is no need of actual
transfer of the session keys through the network. Also only
simple mathematical operations are used to calculate keys
for encryption of data so not much of resource usage at the
nodes. All together it aims to provide a simple yet secure
and fast data dissemination protocol for usage in wireless
sensor networks. Node compromise by an attacker can be an
issue in this protocol. It will be dealt with as part of the
future works.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
G. Tolle and D. Culler, Design of an applicationcooperative management system for wireless sensor
networks, in Proc. EWSN, pp. 121132, 2005.
Lin, K., Levis, P.: Data discovery and
dissemination with dip. In: Proceedings of the 2008
International Conference on Information Processing
in Sensor Networks (IPSN 2008), Washington, DC,
USA, IEEE Computer Society (2008) 433-444.
T. Dang, N. Bulusu, W. Feng, and S. Park, DHV: a
code consistency maintenance protocol for multihop wireless sensor networks, in Proc. 2009
EWSN, pp. 327-342.
Hui, J.W., Culler, D.: The dynamic behaviour of a
data
dissemination
protocol
for
network
programming at scale. In: Proceedings of the 2nd
international conference on Embedded networked
sensor systems (Sensys 04), New York, NY, USA,
ACM (2004) 81-94.
Nildo dos Santos Ribeiro Junior, Marcos A. M.
Vieira1, Luiz F. M. Vieira1 and Om Gnawali,
CodeDrip: Data Dissemination Protocol with
Network Coding for Wireless Sensor Networks, In
Proceedings of the 11th European conference on
Wireless sensor networks (EWSN 2014), Feb. 2014.
Hailun
Tan,
Secure
multi-hop
network
programming with multiple one-way key chains,
In: Proceedings of the International conference on
Embedded networked sensor systems (Sensys 07),
Sydney, Australia, ACM.
Yingpei Zeng, Jiannong Cao, Shigeng Zhang,
Shanqing Guo, Li Xie, Pollution Attack: A New
Attack Against Localization in Wireless Sensor
Networks, IEEE, WCNC-2009.
I-Hong Hou, Yu-En Tsai, T.F. Abdelzaher, and I.
Gupta. Adapcode: Adaptive network coding for
code updates in wireless sensor networks. In
INFOCOM 2008.The 27th Conference on Computer
Communications. IEEE, pages 15171525, 2008.
Andrew Hagedorn, David Starobinski, and Ari
Trachtenberg. Rateless deluge: Over-the-air
programming of wireless sensor networks using
random linear codes. In Proceedings of the 7th
international conference on Information processing
in sensor networks, IPSN 08, pages 457466,
Washington, DC, USA, 2008. IEEE Computer
Society.
S. Katti, H. Rahul,W. Hu, D. Katabi, M.Medard, and
J. Crowcroft, XORs in the air: practical wireless
network coding", ACM SIGCOMM Computer
Communication Review, vol. 36, no. 4, pp. 243-25,
2006.
Philip Levis, Nelson Lee, Matt Welsh, and David
Culler. Tossim: accurate and scalable simulation of
entire tinyos applications, In SenSys '03, pages 126137, New York, NY, USA, 2003. ACM Press.
TinyOS: an open-source OS for the networked
sensor regime. Available: http://www.tinyos.net/.
Simulating a Wireless Sensor Network, 2010-2013,
[Online] Available: http://virtual-labs. ac.in/ cse28/
ant/ ant/8/theory/.
_______________________________________________________________________________________
Volume: 03 Special Issue: 15 | Dec-2014 | IWCPS-2014, Available @ http://www.ijret.org
61