Research Plan Proposal: The Iis University, Jaipur
Research Plan Proposal: The Iis University, Jaipur
Research Plan Proposal: The Iis University, Jaipur
Ayush Sogani
Enroll. No.: IISU/2010/177
1
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
1. Topic
Impact of Security Issues and Analysis over Wireless Sensor Networks and their
Integration with the Internet
2. Introduction
Wireless Networks:
Wireless network refers to a computer network that is not connected by cables of any
kind. It is a method by which homes, telecommunications networks and enterprise
(business) installations avoid the costly process of introducing cables into a building,
or as a connection between various equipment locations.
Sensor Networks:
A sensor network is a group of specialized transducers (A transducer is an electronic
device that converts energy from one form to another. E.g., Antenna) with a
communications infrastructure intended to monitor and record conditions at diverse
locations. A sensor network consists of multiple detection stations called sensor
nodes, each of which is small, lightweight and portable.
3. Review of Literature
3.1 Introduction
Wireless Sensor Networks are currently receiving significant attention due to infinite
possibilities available with them. Researchers have focused on different research
challenges that have limited capabilities i.e., security, deployment over Internet,
2
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
Cheap, smart devices with multiple onboard sensors, networked through wireless
links and the Internet & deployed in large numbers, provide extraordinary
opportunities for instrumenting and controlling homes, cities, and the environment,
this is a technology of future, the Networked microsensors technology[1].
These sensors are becoming smaller. It is possible to fit them into a smaller volume
with more power and with less-production costs. This becomes possible with the help
of Microelectromechanical Systems (MEMS) technology [2].
Wireless sensor networks (WSN) are abbreviated wireless networks of small, low-
cost sensor nodes, which collect and distribute environmental data. WSNs helps in
monitoring and controlling of physical environments from remote locations with
better accuracy than other known monitoring systems such as remote sensing. These
tiny sensor nodes leverage the idea of sensor networks based on collective effort of a
large number of nodes. Sensor networks represent a significant improvement over
traditional sensors. As they have the capabilities to route data back by a multi- hop
infrastructureless architecture to the base station or sink, which is the entity where
information is required. The sensor nodes unite together to collect desired
information from the environment by performing in-network data processing and
aggregation (data diffusion).
3
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
Many wireless sensor network applications cannot run in complete isolation; the
sensor network must be connected to monitoring and controlling entities through
known wireless/wired networks like IP-based networks. Such interconnection
achieves many advantages and increases sensor networks benefits such as:
Controlling and monitoring sensor networks remotely.
Providing security at the gateway node
Integrating data collected from sensor networks into data mines.
Ability to combine multiple remote sensor networks into one virtual
sensor network.
4
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
3.4 Integration Future Large-scale Wireless Sensor Networks with the Internet
For practical deployment, a sensor network does not work in isolation. For many
important applications, however, it is required to integrate these sensor networks to
the existing Internet Protocol (IP) networks.
The task of connecting WSN to the existing Internet brings with it several challenges
[9]. Any network wishing to be connected to the Internet needs to address the
question of how it will interface with the standard protocols like the IP. The
characteristics of WSN make them different from traditional IP-based networks as
summarized in Annexure Table 1. The chief among these are that WSN are large-
scale unattended systems consisting of resource-constrained nodes that are best-suited
to application-specific, data-centric routing.
5
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
Giving IP address to every sensor node is not the right approach to integrating sensor
networks with the Internet. For this purpose a gateway level protocol approach is
developed for both homogeneous networks (where all nodes have the same capability
in terms of processing, energy and communication resources) and heterogeneous
networks (where some nodes are more capable compare to other nodes). Application
level gateway solution is used in integration of Homogeneous networks and the
Internet and an overlay IP network (router) is constructed in case of Heterogeneous
networks that sits on top of the basic wireless sensor network.
Integrity refers to the ability to confirm the message has not been altered, or
changed while it was on the network.
Authentication Need to know if the messages are from the node it claims to
be from, determining the consistency of message’s origin.
Availability is to determine if a node has the ability to use the resources and
the network is available for the messages to move on.
Few attacks [10] are also identified in wireless sensor networks, they are:
Passive Information Gathering
Node Malfunctioning
Message Corruption
Traffic Analysis
Wormholes
Hello flood Attacks
6
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
3.6 Integrating Wireless Sensor Networks and the Internet: A Security Analysis
Access to the information produced by sensor networks has not been considered
intensely. Once the data is retrieved from the sensors, the user of the network will be
able to read it directly through the base station. This access to the data must be
challenged and a security mechanism must be defined for the user authentication.
This can be achieved by integrating the sensor networks into the Internet. Sensor
networks must be secure by themselves, and the interactions between the sensor
networks and the Internet must also fulfill with certain security properties [8]. The
integration strategies are shown in the Appendix Fig 2.
In front-end proxy solution, the base station serves as an interface between the data
acquisition network (sensor network) and the data dissemination network (the
Internet). The base station collects and stores all the information coming from the
sensor network, and also sends any control information to the sensor nodes. There is
no direct connection between the Internet and a sensor node: all incoming and
outgoing information will be parsed by the base station [8].
In the gateway solution, the base station acts as an application layer gateway, in care
of translating the lower layer protocols from both networks (e.g. TCP/IP and
proprietary). As a result, the sensor nodes and the Internet hosts can exchange
information directly.
In the TCP/IP overlay solution, sensor nodes do communicate with other nodes using
TCP/IP. Therefore, the main function of the base station is to perform as a router,
forwarding the packets from and to the sensor nodes. These nodes must implement
the protocols and standards used on the Internet, such as the TCP/IP stacks and web
services interfaces [8].
Sensor networks are not integrally secure. Its nodes must be deployed near the source
of the events, and they use wireless communication channels for exchanging data.
Therefore, any nasty challenger can manipulate the sensor nodes, the environment, or
the communication channel on its own benefit. Besides, if that malicious outsider
gains access to one or more sensor nodes, it may be possible to deploy the
information flow that navigates the nodes. Therefore, a sensor network must be
7
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
designed from hardware of its nodes to their application layer to protect or reduce the
effect of such attacks.
9
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
10
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
have a critical piece of information that is to be sent to the sink (active node). To
manage and hold the information by the sensor nodes for a long period of time is not
possible due to the lack of energy, computation and communication capabilities and
it is also unsecured to put data in sensor node for a long period of time because of
their inherent limitations. Therefore, there must be a secured platform available that
can take the information from the sensor nodes and store them securely. Now days
Internet is the best platform where we can save the information generated from the
sensor nodes. Due to inherent limitations in sensor networks security is an area
where lots of research work is to be taken place and the complete integration of
sensor networks and the Internet is still under research work. During this integration
process security is always been a challenging issue. Therefore a schema is required
which gives a completely integrated secured Internet based sensor network. These
limitations and the requirement of such a schema, gives motivation towards
development of an Internet based secure sensor network.
5. Objectives
Recent advances in wireless communication and embedded computing technologies
have led to the rise of wireless sensor networks technology. These nodes can be
deployed in many fields including health, environment and battlefield monitoring
and represent a big source of varied data. In order to support huge amounts of data,
today solutions are based on different Internet Applications. Accordingly, it seems
obvious to bring wireless sensor networks to the Internet. However, this integration
process raises many key challenges. Among them security, localization and power
management are few problems and may be the most critical is the security of sensor
networks, the interaction between these networks and the Internet.
1. The goal of this research is to study how possible is the integration of
wireless sensor networks with Internet and to assess its impact on different
security issues and analysis.
2. A schema would be defined for the Internet based wireless sensor networks
and propose optimization solutions based on data aggregation and several
security mechanisms to maximize the security and privacy issues.
11
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
Description: At the end of this step, we will have a good knowledge of Internet based
applications, wireless sensor networks and the existing solutions for their integration
and also know about the key challenges of this issue.
Document: Description of existing agendas while pointing out for each one the
benefits and the drawbacks.
At least 10-12 months are required for: Proposing a schema for Internet based
wireless sensor networks.
Description: During this step, we will focus on the real integration of wireless sensor
networks with Internet using simulation tools or/and real platform. At the end of this
step, we would be able to show a demonstration of the work done.
7-8 months for: Data aggregation and Security mechanisms will be optimized and
implementation of secured network schema in Internet will be defined.
Description: Based on the previous schemas, we will focus on data aggregation and
security mechanisms in order to make best use of security issues. Then, we will
evaluate the performance of the given proposals.
Document: Description of the proposed approach for security level and comparison
with existing solutions.
12
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
Methodology
RRBegins
Research
Final Results
For this purpose, these are the following tools that can be used:
13
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
TinyOS – A Linux based simulation tool which is used to design and
configure the Wireless Sensor Networks. Different security mechanisms can
also be configured using this tool.
Other simulation tools like NS2, MetLab, etc. are also available. The version of the
tool used for the research work will be the latest version as per availability.
10. References
[1] “Sensor Networks: Evolution, Opportunities and Challenges”, Proceedings of the
IEEE, Vol. 91. No. 8, August 2008.
14
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
[5] John A. Stankovic “Research Challenges for Wireless Sensor Networks”, ACM
SIGBED Review, 2004.
[7] A. Dunkels, T. Voigt, and J. Alonso. “Making TCP/IP Viable for Wireless Sensor
Networks”. In Proceedings of the First European Workshop on Wireless Sensor
Networks (EWSN 2004), work-in-progress session, Berlin, Germany, Jan. 2004.
[8] Rodrigo Roman, Javier Lopez “Integrating Wireless Sensor Networks and the
Internet: A Security Analysis”, Internet Research, Volume 19 issue 2, Emerald,
2009.
[10] Tanveer Zia, Albert Zomaya, “Security Issues in Wireless Sensor Networks”,
International Conference on Systems and Networks Communications, 2006.
ICSNC '06, IEEE, 2006.
[12] Rachna. H and M.S. Patel, “Encryption and Key Management Approach with
In-Network Processing in Wireless Sensor Network and Security Analysis”,
World Journal of Science and Technology 2011, 1(12): 46-49, ISSN: 2231 –
2587.
[13] Sadaqat Ur Rehman, Muhammad Bilal, Basharat Ahmad, Khawaja Muhammad
Yahya, Anees Ullah, Obaid Ur Rehman, “Comparison Based Analysis of
Different Cryptographic and Encryption Techniques Using Message
Authentication Code (MAC) in Wireless Sensor Networks (WSN)”, IJCSI
International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January
2012.
11. Appendix
16
Impact of Security Issues and Analysis over Wireless Sensor 2012
Networks and their Integration with the Internet
Table 1: Key differences between traditional IP-based networks and wireless sensor networks
17