Wireless Sensor Networks Challenges & Solutions Sensor Security & Energy Efficient

Wireless Sensor Networks Challenges & Solutions Sensor Security & Energy Efficient

论文摘要

The relentless miniaturizations of computers and advances in radio-based communications have given rise to a new exciting technology: wireless sensor networks (WSNs). A WSN is a network consisting of numerous small, low-cost, independent sensor nodes that communicate through wireless means. These sensor nodes are self-contained units composed primarily of a microcontroller, a radio, a battery, one or more sensors and some interconnecting circuits.As such, the sensor nodes have limited computing power and energy supply, and instead of performance, they are frequently operated with energy efficiency in mind. Sensor nodes are meant to be deployed without a pre-configured topology and operated unattended, but radio Communications enable them to organize themselves. When data are available through their sensors, radio communications allow the data to be distributed across the network. For monitoring-type applications, e.g. monitoring of natural habitats, this presents unprecedented sensing scale and resolution. For other types of applications, at the same time providing a transparent interface between human activities and the surroundings, WSNs integrate seamlessly with the environment.As with other technologies, WSN is not without its perils. When data are circulated in an unattended network, they might be leaked against the interests of the concerned parties.Operation wise, there should be some means to ensure the availability of the service provided by the network, as well as a way to discriminate between legal and malicious requests to avoid executing tasks that might be disruptive to the network itself. This is where security comes in. These problems are largely categorized as information security and security against denial-of-service (DoS) and others attacks. The common thread that permeates through these two areas is energy efficiency. While security can be gained by tamper proofing the hardware, increasing the computational power of the sensor nodes and so on, practical WSN security is a balancing act that is constantly in search of the highest level of protection that can be squeezed out of the judicious use of limited resources.A secure communication is very important in computer networks and authentication is one of the most eminent preconditions. However, common authentication schemes are not applicable in wireless sensor networks because of the properties of the nodes structure constrained and the public key infrastructures with a centralized certification authority are hard to deploy there. Since sensor, nodes are required to group themselves in order to fulfill a particular task, it is necessary that the group members communicate securely between each other, despite the fact that global security may also be in use.The thesis is divided into three parts. The first part of the thesis concerns defense-oriented issues: design, implementation, and key management. The second part presents the methodology to reduce the wireless sensor energy consumption. Lastly, the third part of the thesis looks at WSNs battlefield attackers issues. In short, this thesis presents six contributions in the field of WSN security:Contribution 1: adopt a framework of self-organization for the wireless sensor network called (SASO Algorithm) which covers key deployment, key establishment, and key distribution. Contributions 2, 3, 4, and 5 are applicable to all SASO system whereas contribution 6 is applicable to the future imaging of energy support.Contribution 2: present a cluster-based re-keying process algorithm for wireless sensor networks. Lightweight, cluster-based, decentralized key management architecture for WSNs covers the aspects of key deployment, key refreshment, and key establishment. Our architecture uses only symmetric-key cryptography, and is based on a clear set of assumptions and guidelines. The balance between security and energy consumption is achieved by partitioning a system into two interoperable security realms: the supervised realm trades off simplicity and resources for higher security whereas in the unsupervised realm the opposite is true. Key deployment uses minimal key storage while key refreshment is based on the well-studied scheme of Abdalla et al. The novelty of this work arises at the concept of the security realms and the fact that the protocol suite is the first in WSNs to be formally verified.This algorithm assumes that the sensor nodes should have the following keys:a. Master key: each sensor node at the time of manufacture is imprinted with master key and Local Administrative Function.b. Local control key: Before node deployment, each node is injected with initial Local Control Key (LC), which is the basic parameter for the re-keying function of our proposal. c. Session key: a session key randomly is generated to ensure the security of a communications session between nodes. A session key is derived from master key and LC key using session-key derivation scheme. Session keys are changing frequently.Local Administrative Functions (Master Function, Re-Keying Function, and Derivation Function) imprinted with sensor node to achieve a high-level security of node-to-node communication. The Local Administrative Function is responsible for key generation of the cluster session keys depending on the initial master key and local control key imprinted at the time of manufacture, where as the HMAC is adopted from Local Administrative Function work.Re-keying function is responsible for assigning a new value to local control key (LC). Cluster head periodically refreshes to respond to the changes of LC key, which will inform all its members of a new change using a secret method. The purpose of periodically refreshing is to enhance security and guarantees that the communication between any two nodes remains secure despite the compromise of any number of other nodes in the network.If, for any reason, the session k’ key is compromised and an adversary attacker captures these keys, it is infeasible to deduce k from it because one of the parameters of this key is not found and is already assigned to a new value. This is the one advantage of SASO re-keying proposal. An attacker needs to know three parameters to break the link layer security (master key, LC key, session key) and re-keying function, that is responsible for keying and re-keying keys session for inter and intra cluster communication method. This makes SASO re-keying algorithm too complex for an attacker to attack the link layer communication on the networks even if a key session is known for any reason. The SASO algorithm has two kinds of re-keying system model, i) SASO with single session key called SASOBS and ii)SASO with different session keys called SASO-CH. The difference between these two models is the first model uses only one session key for whole network and uses the base station for re-keying process periodically or when needed depends upon interrupt factor. Whereas in the second model, each cluster periodically, or when re-keying is needed, changes its own session key and sends the new session key to save its base station for clusters communication use. The advantage points of SASOBS models that use a single session key for whole network and various session keys for each cluster of SASOCH models proposed in this chapter are: a. Decentralized communication process, where establishing a very fast communication between nodes has the same range transmission, and non-energy consumption consumed in computational process for generating a session key.b. Scalability to extend the network size; adding new nodes or to replace the nodes that have failed without incurring significant overheads.c. Different applications do not require the preparation of a large number of keys as it requires changing the generated function of these keys to suit each application separately.d. Centralization needed for the re-keying process or for inter cluster protocols when the session key is different.e. The SASOCH model shared a group key with other clusters using base station, where each cluster head sends its own cluster key to base station. So an arbitrary node from different clusters can establish a secure communication through base station.The disadvantage point for SASOJBS model is that the risk is high when the session key is obtained. Moreover, attacker can access to the whole network if he can obtain any session round. On the contrary, an attacker attacks only the cluster if he obtained a session key when SASO-CH is used.Contribution 3: Propose the communication protocols for intra/inter cluster, contribution present direct connection, in-direct connection, hybrid connection, and tree based connection protocols to perform a secure node-to-node, cluster to node and cluster-to-cluster communications protocols, the advantage of these protocols is to achieve a secure communication between nodes on intra or inter cluster of SASOCH method .Contribution 4: Sensor networks consist of hundreds or thousands of sensor nodes, low power devices equipped with one or more sensors. Power consumption is the main challenge of expanding the network, since the terminal nodes are more vulnerable to energy consumption. This thesis proposes the Tasks Scheduling and Distribution of Roles Dormant Cells of Wireless Sensor Network (TSDRDC) to curb excessive consumption of energy that consumed by duplication and unhelpful tasks. Duplicate Dropping and Roles-Dormant Cells are proposed to achieve equitable distribution of energy consumption for all nodes on the network. Integrating the advantage of protocol existing LEACH with the TSDRDC approach led to an improvement in the formation of more homogenous clusters, better performance, and increased lifetimes of wireless sensor networks.Contribution 5: In the evaluation of re-keying system security, we present an application of battlefields’ and hotspots’ challenges and solutions. Covering the difficulties and challenges facing the Wireless Sensor Networks on the battlefield, which is often vulnerable to attackers’ networks either in the data or in corrupting control devices and the attempt to consume a lot of energy by sending a large quantity of useless packets, which contributes to excessive consumption of energy and leads to exit nodes from work. Since technology has become widespread on battlefields now, the sensor nodes are vulnerable to attackers from both sides.Contribution 6: Proposed the possibility of transferring energy through the air. This dilemma has been carried forward to future work to acquire more effort and adequate scrutiny because of its importance in our daily lives.

论文目录

  • ABSTRACT
  • TABLE OF CONTENTS
  • LIST OF FIGURES
  • LIST OF TABLES
  • CHAPTER 1 INTRODUCTION
  • 1.1 WSN HISTORIES
  • 1.1.1 MILITARY NETWORKS OF WIRELESS SENSORS
  • 1.1.2 CIVIL AND COMMERCIAL INDUSTRY OF WSNS
  • 1.2 WSN CHARACTERISTICS
  • 1.2.1 NODES:
  • 1.2.2 NETWORKS
  • 1.3 APPLICATIONS
  • 1.3.1 MILITARY
  • 1.3.2 DISASTER DETECTION AND RELIEF
  • 1.3.3 INDUSTRY
  • 1.3.4 AGRICULTURE
  • 1.3.5 ENVIRONMENTAL MONITORING
  • 1.3.6 INTELLIGENT BUILDINGS
  • 1.3.7 HEALTH AND MEDICAL
  • 1.3.8 LAW ENFORCEMENT
  • 1.3.9 TRANSPORTATION
  • 1.3.10 SPACE EXPLORATION
  • 1.4 SECURITY
  • 1.4.1 USER COMPROMISE
  • 1.4.2 HARDWARE COMPROMISE
  • 1.5 OPEN PROBLEMS:WIRELESS SENSOR NETWORKS CHALLENGES
  • 1.5.1 VULNERABILITY OF PHYSICAL CAPTURE
  • 1.5.2 LIMITED COMPUTATIONAL POWER
  • 1.5.3 LIMITED MEMORY
  • 1.5.4 LIMITED DATA RATE
  • 1.5.5 LIMITED COMMUNICATION RANG
  • 1.5.6 LIMITED ENERGY SUPPLY
  • 1.6 WIRELESS LAN GLOSSARY
  • 1.7 RESEARCH QUESTIONS
  • 1.8 THESIS OVERVIEW
  • 1.9 SUMMARIES
  • CHAPTER 2 AN OVERVIEW OF WSNS TECHNOLOGY AND MAC PROTOCOLS
  • 2.1 WIRELESS LOCAL AREA NETWORKS
  • 2.1.1 WLAN DEFINITION
  • 2.1.2 WLAN TECHNOLOGY
  • 2.2 WIRELESS SENSOR NETWORKS
  • 2.2.1 WIRELESS SENSOR NETWORK ARCHITECTURE PROTOCOLS
  • 2.3 MEDIUM ACCESS CONTROL PROTOCOLS
  • 2.3.1 IEEE 802.11 WIRELESS LOCAL AREA NETWORK STANDARD
  • 2.3.2 802.15.4 WIRELESS PERSONAL AREA NETWORK STANDARD
  • 2.3.3 CLASSIFICATIONS OF MEDIUM ACCESS CONTROL PROTOCOLS
  • 2.4 WIRELESS SENSOR NETWORK MAC ENERGY-EFFICIENCY TECHNIQUES
  • 2.4.1 IDLE LISTENING
  • 2.4.2 FRAME COLLISIONS
  • 2.5 ADDITIONAL TDMA SENSOR MAC ENERGY-EFFICIENT PROTOCOLS
  • 2.5.1 LOW-ENERGY ADAPTIVE CLUSTERING HIERARCHY(LEACH)
  • 2.5.2 POWER AWARE CLUSTERED TDMA(PACT)
  • 2.5.3 BIT-MAP-ASSISTED ENERGY-EFFICIENT MAC SCHEME FOR WSN(BMA)
  • 2.6 WIRELESS SENSOR NETWORK SECURITY
  • 2.6.1 TINYSEC
  • 2.6.2 HARDWARE ADVANCED ENCRYPTION SYSTEM(AES)
  • 2.7 WIRELESS SENSOR NETWORK TIMING CONSIDERATIONS
  • 2.8 SUMMARY
  • CHAPTER 3 WSNS SECURITY AND KEY-MANAGEMENT PROTOCOLS
  • CLUSTER-BASED RE-KEYING PROCESS FOR WSNS
  • 3.1 PRELIMINARY
  • 3.2 OPEN PROBLEM
  • 3.3 KEY MANAGEMENT SCHEME
  • 3.3.1 LITERATURE
  • 3.3.2 RELATED WORKS
  • 3.4 SELF-ORGANIZATION(SASO)
  • 3.5 SASO ADMINISTRATIVE PROCESSES
  • 3.5.1 ASSUMPTIONS
  • 3.5.2 LOCAL ADMINISTRATIVE FUNCTIONS
  • 3.5.3 SESSION-KEY DERIVATION SCHEME
  • 3.6 SASO PRE-DISTRIBUTION
  • 3.6.1 KEY DEPLOYMENT:
  • 3.6.2 KEY ESTABLISHES:
  • 3.6.3 NODE ADDITION:
  • 3.6.4 NODE EVICTION:
  • 3.7 SASO RE-KEYING MODELS
  • 3.8 SASO CONNECTION PROTOCOLS
  • 3.8.1 INTRA CLUSTER KEYING PROTOCOLS
  • 3.8.2 INTER-CLUSTER TREE-BASED CONNECTION PROTOCOL
  • 3.9 DISCUSSION AND SIMULATIONS
  • 3.9.1 PERFORMANCE EVALUATION
  • 3.9.2 SIMULATIONS
  • 3.9.3 COMPARISONS
  • 3.10 SUMMARIES
  • CHAPTER 4 ENERGY EFFICIENT IN WSNS
  • EQUITABLE DISTRIBUTION ENERGY CONSUMPTION OF WIRELESS SENSOR NETWORKS
  • 4.1 INTRODUCTION
  • 4.2 ENERGY-EFFICIENCY ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK
  • 4.2.1 LEACH
  • 4.2.2 PEGASIS
  • 4.2.3 SPINS
  • 4.2.4 GAF
  • 4.2.5 SPEED
  • 4.3 TASKS SCHEDULING AND DISTRIBUTION OF ROLES DORMANT CELLS(TSD-MAC)
  • 4.3.1 PRELIMINARIES
  • 4.3.2 CLUSTER CONFIGURATION
  • 4.3.3 DISTRIBUTION TASKS FOR CLUSTER HEAD
  • 4.3.4 DISTRIBUTION OF ROLES-DORMANT CELLS
  • 4.4 SIMULATION RESULTS AND DISCUSSIONS
  • 4.5 COMPARISONS
  • 4.6 SUMMARIES
  • CHAPTER 5 WSNS BATTLEFIELD ATTACKS
  • WIRELESS SENSOR NETWORKS OF BATTLEFIELDS HOTSPOT:CHALLENGES AND SOLUTIONS
  • 5.1 INTRODUCTION
  • 5.2 ATTACKS MODEL
  • 5.2.1 BLACK HOLE ATTACK
  • 5.2.2 SINK HOLE ATTACK
  • 5.2.3 SELECTIVE FORWARDING ATTACK
  • 5.2.4 FLOODING ATTACKS
  • 5.2.5 MISDIRECTION ATTACK
  • 5.3 PROPOSED SOLUTIONS,SIMULATIONS AND DISCUSSIONS
  • 5.3.1 PROPOSED SOLUTION
  • 5.3.2 SIMULATIONS
  • 5.3.3 DISCUSSIONS
  • 5.4 SUMMARIES
  • CHAPTER 6 CONCLUSIONS AND FUTURE WORKS
  • 6.1 CONCLUSIONS
  • 6.2 FUTURE WORKS
  • 6.3 THESIS ACKNOWLEDGMENTS
  • PUBLICATIONS
  • REFERENCES
  • APPENDIX 1.THESIS PSEUDO CODE
  • A.HMAC SHA1 CODE
  • B.SIMULATION PARAMETERS
  • C.SENSOR NODE DEPLOYMENT
  • D.CLUSTER CONFIRM AND HEAD SELECTION
  • E.MALICIOUS NODE RANDOM SELECTION
  • F.MALICIOUS NODE FIXED SELECTED
  • G.MALICIOUS NODE DETECTION
  • H.REKEYING FUNCTION
  • APPENDIX 2.NETWORK LIFETIME CALCULATIONS & ALGORITHMS
  • A.SYMBOLS:
  • B.TRANSMITTING NODE:
  • C.RECEIVING NODE:
  • D.OTHER NODES:
  • E.GLOSSARY
  • APPENDIX 3.SIMULATION OUTPUT RESULTS
  • ACKNOWLEDGEMENTS
  • 相关论文文献

    • [1].借助2009中国国际嵌入式大会和IAC,TME+SENSOR2009 GE Fanuc引导市场[J]. 工业控制计算机 2009(06)
    • [2].图尔克在IAC,TME+SENSOR上的风采[J]. 石油化工自动化 2010(04)
    • [3].SENSOR CHINA成功举办,特色传感器+IoT创新技术大放光彩[J]. 传感器世界 2017(09)
    • [4].“IAC,TME+SENSOR 2009”展会打造全新展示平台[J]. 广东印刷 2009(03)
    • [5].“IAC,TME+SENSOR 2009”展会打造全新展示平台[J]. 中国包装工业 2009(05)
    • [6].图尔克高调亮相IAC,TME+SENSOR 2009[J]. 石油化工自动化 2009(04)
    • [7].The 14~(th) Chinese Academic Conference on Gas and Humidity Sensing Technology(GAS SENSOR-2019)[J]. Chinese Chemical Letters 2020(08)
    • [8].图尔克将亮相IAC,TME+SENSOR 2010[J]. 仪表技术 2010(02)
    • [9].强强联合打造全新展示平台 AUTOMATION SHANGHAI-IAC,TME+SENSOR 2009盛大召开[J]. 现代制造 2009(22)
    • [10].SENSOR CHINA 2018引领传感新风向,项目对接亮点纷呈[J]. 电源世界 2018(09)
    • [11].2020 SENSOR CHINA大幕即将拉起邀您共赴Sensor之约[J]. 传感器世界 2020(08)
    • [12].OC-SENSOR μ全自动粪便潜血分析仪临床应用评价[J]. 福建医药杂志 2009(01)
    • [13].基于SENSOR式汽车实时监控系统[J]. 中国新技术新产品 2019(06)
    • [14].A highly pixelated CdZnTe detector based on Topmetal-II~- sensor[J]. Chinese Physics C 2017(04)
    • [15].AN INFORMATION FUSION METHOD FOR SENSOR DATA RECTIFICATION[J]. Journal of Electronics(China) 2012(Z1)
    • [16].EKAES:AN EFFICIENT KEY AGREEMENT AND ENCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS[J]. Journal of Electronics(China) 2008(04)
    • [17].用“第三只眼”看IAC,TME+SENSOR2010展会[J]. 自动化博览 2010(07)
    • [18].DECISION FUSION FOR WIRELESS SENSOR NETWORKS UNDER NAKAGAMI FADING CHANNELS[J]. Journal of Electronics(China) 2010(02)
    • [19].德国传感器展团亮相IAC,TME+SENSOR 2008展会[J]. 轻工机械 2008(02)
    • [20].2008 IAC,TME+SENSOR展览会侧记[J]. 自动化博览 2008(07)
    • [21].会议点击[J]. 上海信息化 2016(10)
    • [22].基于多元线性回归预测模型的sensor态势研究[J]. 计算机技术与发展 2011(09)
    • [23].A LOCAL DYNAMIC CLUSTER SELF-ORGANIZATION ALGORITHM IN WIRELESS SENSOR NETWORKS FOR RAINFALL MONITORING[J]. Journal of Electronics(China) 2010(02)
    • [24].物联网中移动Sensor节点漫游的组合安全认证协议[J]. 中国科学:信息科学 2012(07)
    • [25].BLIND CHANNEL AND SYMBOL JOINT ESTIMATION IN COOPERATIVE MIMO FOR WIRELESS SENSOR NETWORK[J]. Journal of Electronics(China) 2008(04)
    • [26].UREA-BASED POLYACETYLENES AS AN OPTICAL SENSOR FOR FLUORIDE IONS[J]. Chinese Journal of Polymer Science 2013(04)
    • [27].A FAULT DETECTION SENSOR FOR CIRCUIT AGING USING DOUBLE-EDGE-TRIGGERED FLIP-FLOP[J]. Journal of Electronics(China) 2013(01)
    • [28].梯级电价,节能省钱贼重要[J]. 电脑知识与技术(经验技巧) 2012(10)
    • [29].RELOCATION ALGORITHM FOR NON-UNIFORM DISTRIBUTION IN MOBILE SENSOR NETWORK[J]. Journal of Electronics(China) 2009(02)
    • [30].LOCALIZATION FOR MOBILE TARGET IN WIRELESS SENSOR NETWORKS[J]. Journal of Electronics(China) 2008(04)
    Wireless Sensor Networks Challenges & Solutions Sensor Security & Energy Efficient
    下载Doc文档

    猜你喜欢