Professional Documents
Culture Documents
3
Dr.M.L Valarmathi
Department of CSE,
Government College of Technology,
Coimbatore , Tamil Nadu - 641 013, India.
ml_valarmathi@rediffmail.com
Abstract- IEEE 802.16 standard known as WiMAX (Worldwide more interested in broadband applications (e.g., video
Interoperability for Microwave Access), is one of the most streaming, video conferencing, online gaming etc.) that
promising wireless access technology for next generation all-IP require assurances in terms of throughput, packet delay and
networks. The fundamental requirements for WiMAX to define jitter, in order to perform well [3].
itself as a possible winning technology are data reliability and WiMAX solutions are highly deployable, so the
the ability to deliver multimedia contents. WiMAX networks
also face all the problems related to the hostile wireless
initial response team can set up a temporary wireless network
environment, where power constraints make it difficult to at the site of the accident, event, or natural disaster, in a
provide hard QoS guarantees. This paper addresses the main matter of minutes. They can also relay traffic from this
issues of security and power efficiency, proposing a novel network back to a control or dispatch center, over an existing
approach for data transmission. Direct transmission consumes WiMAX network. The 802.16 standard specifies two modes
more power. Multihop communication involves formation of for sharing the wireless medium: Point-to-Multipoint (PMP)
groups, where group heads aggregate the data before and Mesh (optional). In the PMP mode, the nodes are
transmitting it to the Base Station. It uses Chessboard clustering organized into a cellular-like structure, where a Base Station
algorithm to perform clustering. If a group head is (BS) serves a set of Subscriber Stations (SSs) within the same
compromised, then the Base Station cannot ensure the
correctness of the data sent to it. A group head is selected at
antenna sector in a broadcast manner, with all SSs receiving
random for forwarding the aggregate. Finally, this paper the same transmission from the BS. Transmissions from SSs
proposes a new and novel mechanism that the Base Station uses are directed to and coordinated by the BS. On the other hand,
to ensure the correctness of the data sent to it. in Mesh mode, the nodes are organized adhoc and scheduling
is distributed among them.[1] In this paper PMP mode of
Keywords - Data aggregation, Direct Voting, Witness-Based communication is used. To conserve power, the Base Station
Approach, Clustering, Indirect Antivoting . and the event sensing nodes do not communicate directly.
While the Base Station can have continuous,
I. INTRODUCTION unlimited power supply, other nodes usually have limited
power supply and are battery-powered. It is inconvenient to
IEEE 802.16, also called WiMAX was developed to replace them once they are deployed. Sometimes,
accommodate large coverage and high bandwidth last-mile replacement is even impossible. Thus, energy efficiency is a
Internet access. Indeed, the provision of QoS guarantees will critical design consideration of WiMAX networks.
be a pressing need in the next generation of Internet, in order Communication is a dominant source of energy consumption.
to enable the introduction of novel broadband multimedia Security is one of the main barriers and is crucial to wide-
applications. Even if the deployment and the use of this scale deployment of WiMAX networks, but has gained little
standard has started, the use of WiMAX networks is still attention so far. Once a node has been compromised, the
limited to particular situations. It represents an emerging security of the network degrades quickly if no measures are
research area, providing useful applications in various fields taken to deal with this event.
such as habitat monitoring, battlefield surveillance and forest
fire monitoring. In fact, Wimax technology allows reaching II.ISSUES
high bit rate and covering large areas with a single Base
Station (BS), it gives to operators the possibility to offer There are various issues to be considered. They are
connectivity to end users in a cost effective way. It delivers discussed below.
70 Mb/s over 30 miles theoretically. It supports multi-class
services and guarantees the QoS requirements of delay-
bounded services [2].Users are actually getting more and
Efficient management of the wireless network is This section discusses about the uneven energy
crucial to extend the life of the system. Nodes’ energy cannot consumption (UEC) problem in sensor networks and briefly
support long haul communication to reach a remote command describes the chessboard clustering scheme that solves the
site and hence they require multi-tier architecture to forward UEC problem. The same clustering technique can be used in
data. It is a known fact that 70% of the energy is spent in data a WiMAX network also.
transmission. This paper proposes a secured, fault tolerant
and a power-efficient mechanism for data aggregation in a 1) The UEC problem
WiMAX network.
In LEACH [6] and LRS [15] solve the uneven energy
1) Data Funneling consumption problem (i.e., a cluster head consumes much
more energy than a cluster member). Periodically different
Due to energy and other resource constraints, nodes are elected to serve as the group head.
communication between a set of nodes to a single destination However, these schemes suffer from the large
should be reduced to a minimum. Aggregation techniques are overhead of frequent re-clustering. Furthermore rotating
often used for secure routing and have many advantages. The group-heads among the nodes does not solve the UEC
Data Funneling method [14] allows the network to reduce the problem caused by the many-to-one traffic pattern in the
amount of energy spent on communication setup and control- network, where the nodes near the BS have much heavier
an important concern in low data-rate communication. communication burden than others. For example, in figure 1,
Instead of having an individual data stream from each node to the BS is located in the left-bottom corner of the BS via
a destination, there exists only one data stream from a group multi-hops communication. Nodes within the transmission
of nodes to that particular destination. Lossless compression range of the BS are the critical nodes. When all the critical
of data is done using encoding information in the ordering of nodes fail, other nodes will be disconnected from the BS, and
the nodes’ packets helps in obtaining additional gains. the whole network becomes unavailable. The UEC problem
2) SEDAN exists no matter where the BS is located (eg., at the center)
scheme guarantees that the Base Station obtains the detected data to it becomes too large and the nodes die quickly. Since
result. However, the accuracy of the result is not certain. large numbers of nodes are densely deployed, neighbor nodes
Two problems must be solved to ensure that the may be very close to each other. Multihop communication
Base Station obtains the correct result. First, every group can effectively overcome some of the signal propagation
head must correctly fuse all the local decisions, which also effects experienced in long-distance wireless communication.
implies that all the fusion results must be the same. This work Nodes carry limited, generally irreplaceable, power sources.
assumes that this problem has been solved. The second Therefore, while traditional networks aim to achieve high
problem is concerned with the assurance of the fusion result. quality of service (QoS) provisions, network protocols must
The transmission between the fusion node and the Base focus primarily on power conservation.
Station is assumed herein to be error-free. It involves long MACs. Even from the lower level,
Since some Group heads may be compromised, the the nodes send their IID, data and the MAC (KA, dA).[10] At
node chosen by the Base Station to transmit the fusion result the next level the nodes append their data and their MAC. It
may be one of the compromised nodes. Malicious data may is a known fact that the low-level nodes are less prone to
be sent by the compromised node, and the Base Station attacks. They have the capability to just sense the events. So
cannot discover the compromised nodes from the normal the intruders are less interested in these nodes. Providing
Group heads, since the data detected by the nodes are not sent security at these nodes involve unnecessary transmission
directly to the Base Station. Consequently, the result obtained overhead.
at the Base Station may be incorrect [9]. Various methods have been proposed that deal with
providing an assured data transfer from the Group heads to
V. EXISTING SYSTEM the Base Station. They are Witness Based Approach and
Direct Voting. But these methods have various demerits.
In the following sections, only one group/cluster is They involve unnecessary transmissions. Within a particular
taken into consideration. SEDAN provides hop-by-hop cell, more than fusion nodes are present. When a particular
security. Witness based Approach and Direct Voting provide cell is active, these nodes are alive and aggregate the data.
secured transfer of data between the Cluster head and the Only one node forwards the aggregate to the next active cell.
Base Station. These approaches ensure security in a WSN.
The same is applicable to a WiMAX network. B. Witness Based Approach
Direct transmission is a simple approach in which In many applications of WiMAX Network a Sink is
each node transmits its own data directly to the Base Station. interested in aggregated data instead of exact values from all
However, if the Base Station is far away, the cost of sending nodes. Sending aggregated data, reduces the amount of data
to be transmitted and thereby conserve energy. Indeed current cryptography. The method makes use of set of keys as
in-network aggregation schemes are helpful to conserve discussed below.
energy but they are designed without considering possible In the proposed method, a Group head is selected at random
security issues related to data privacy. A wireless network for forwarding the aggregate.
designed with neighboring nodes, shares keys. In either
situation the potential for aggregator nodes to be physically The Group head sends the data by encrypting it with
compromised is high. That is data privacy is at high risk. the K1, where
Therefore secure data aggregation is desirable where data can
be aggregated without the need for decryption at aggregator K 1 = private key of the Group head + public
nodes. Aggregation becomes especially challenging if end-to- key of the Base Station (1)
end privacy between a source and a destination is required. Data after encryption at the sender = data from
[12] the sender ^ K1 (2)
Saving energy is a very critical issue in WiMAX
Network , since nodes are typically powered by batteries with The Base Station receives the encrypted value,
a limited capacity. Since the radio is the main cause of power decrypts it with key K2 , where
consumption in a node, transmission/reception of data should
be limited as much as possible. Hung-Ta Pai and Yunghsiang K 2 = private key of the Base Station + public key
S. Han [13] proposed a new scheme to ensure data fusion of the Group head (3)
assurance. This method is better than the witness-based Data after decryption at the receiver = data at
method. The Base Station obtains votes contributing to the the receiver ^ K2 (4)
transmitted fusion result directly from the witness nodes.
Only one copy of the correct fusion data provided by one The Base Station broadcasts the aggregate value after
uncompromised fusion node is transmitted to the Base encrypting it with a key K2 .
Station. No valid fusion data are available, if the transmitted The Base Station waits for Anti-Votes from the Group
fusion data are not approved by a pre-set number of witness heads which do not accept the data.
nodes. The witness node overhears the transmitted fusion All the Group heads receive the encrypted aggregate
result from the chosen node. It then compares the overheard value sent by the Base Station. They calculate another
result with its own fusion result. aggregate, using the locally available fusion data and
Finally, the witness node can transmit its vote on the compare it with the decrypted copy of the received
overheard result directly to the Base Station, rather than aggregate. Here decryption makes use of a key K1.
through the chosen node. When a fusion node wishes to send If the aggregate values differ, then the Group heads
its fusion result to the Base Station, it adopts the group key to prepare Anti-Votes, encrypt them with key K1 and pole it
encrypt the result, and other fusion nodes serving as witness to the Base Station.
nodes can decode the encrypted result. The witness node then If there are no sufficient Anti-votes from the Group
starts to vote on the transmitted result. A Polling Scheme heads, then the Base Station requests the selected Fusion
based on the voting mechanism using a public key is Node for real fusion result and then receives it. The
proposed to ensure data fusion assurance. system may be preprogramed to accept only 2 Anti-
Demerits : votes, if there are say only 5 Group heads. When the
The Polling Scheme is an overhead. number of Group heads increase or the application
Use of a public key is a threat to security. changes (for eg: in case of military applications only less
number of Anti-Votes are acceptable), the number of
Anti-Votes allowed may change accordingly.
VI. PROPOSED SYSTEM
A . Credibility of the Proposed Mechanism
Firstly, this paper initially concentrates on the
energy constraints of the nodes. Direct communications In this proposed mechanism, virtually there will not
between event-sensing nodes and the Base Station consumes be any need for retransmission of fusion data, until the
more energy. Multi-hop communications involving Clusters randomly selected Cluster head is a malicious node. As the
are best suited for this scenario. Secondly, this work proposes Cluster head to transmit the data is selected at random, the
a novel energy-conserved, fault-tolerant, intrusion-less intruder will not be able to find out the node chosen at that
clustering mechanism. Therefore our work mainly focuses on particular instant. Hence the vulnerability of attacks is very
the security at the main group heads in a region. Security is much reduced. If a malicious Cluster head generates Anti-
provided at the low-levels by using Public-key Cryptography. votes to invalidate the data of some other Cluster head chosen
The procedure is explained below. (The procedure for public- to forward the data, then it will not be considered at the Base
key cryptography is the same as the one used for higher Station, as there will not be sufficient Anti-votes from other
levels). If several copies of the fusion data are sent to the genuine Group heads to support this node. Since a public-key
Base Station, energy required for data transmission is very system is used, a malicious Cluster head cannot pole any
high. Hence in this method, instead of sending the entire set proxy Anti-votes also.
of the fusion data, only the aggregate is transmitted to the
Base Station. The proposed mechanism adopts the public-key BASE STATION
E K1 (A)
250
ROUTING LOAD ( 10 )
-3
200
150
100
50
0
10 20 30 40 50
Figure 4 : Proposed System
NUMBER OF NODES
The main merit is that the private keys are not Figure 5 : Data, votes and Anti-votes are sent
communicated, transmitted or revealed to any other nodes. If Figure 5 shows the transmission overhead when the
the malicious node tries to send invalid aggregate to the Base entire set of data (not the aggregate) and both, votes and anti-
Station, the Base Station receives a lot of Anti-Votes from votes are transmitted. Figure 6 shows the transmission load
other genuine Group heads and rejects the malicious node. when the aggregate value (instead of the entire set of data)
The malicious Group head may try to send a valid aggregate and both, anti-votes and votes are sent.
to get approval from the Base Station and then send an
invalid fusion data. If this is the case, this can be detected at
the Base Station by re-calculating the aggregate and NUMBER OF NODES Vs ROUTING LOAD
40
Mechanism 20
10
node to the Base Station. Power is preserved at the other NUMBER OF NODES
value to the Base Station and then sending the fusion data 40
35
-3
20
overhead and thereby power consumption. This system
15
avoids re-transmission also. Since Anti-Voting mechanism is 10
used, power is spent only for Anti-voting, (i.e) if and only if 5
NUMBER OF NODES
during normal operations.
Figure 7 : Data, votes and Anti-votes are sent
The graph in figure 7 shows the transmission load [6] Heinzelman W.et al, “Energy-efficient communication protocols for
wireless microsensor networks”, in proceedings of Hawaiians Int’l
in indirect anti-voting mechanism – the load when only the
Conference on Systems Science, January 2000.
aggregate value and anti-votes (if any) are sent. [7] Yi Yang, Xinran Wang, Sencun Zhu, and Guohong Cao, SDAP: A
Secure Hop by Hop Data Aggregation Protocol for Sensor Networks,
NUMBER OF NODES Vs ROUTING LOAD MobiHoc’06, Florence, Italy, May 22–25, 2006.
[8] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler and K. Pister, System
350
architecture directions for networked sensors. In Proceedings of ACM
300 ASPLOS IX ,November 2000.
ROUTING LOAD ( 10 )
250
Wireless Sensor Networks, IWCMC’06, Vancouver, British Columbia,
200
Canada, , July 3–6, 2006.
150 [10] M. Bagaa , N. Lasla , A.Ouadjaout ,Y.Challai, “SEDAN : Secure and
100 Efficient protocol for Data Aggregation in Wireless Sensor Networks”,
32nd IEEE conference on Local Computer Networks 2007,1053-1060.
50
[11] W . Du, J. Deng , Y. S. Han , and P. K. Varshney, A Witness-Based
0
10 20 30 40 50
Approach For Data Fusion Assurance In Wireless Sensor Networks, In
NUMBER OF NODES
Proc. GLOBECOM 2003, volume 3, pages 1435–1439, Dec. 2003 .
[12] Kifayat, Kashif Merabti, Madjid Shi, Qi Llewellyn-Jones, David ,
Applying Secure Data Aggregation techniques for a Structure and Density
Independent Group Based Key Management Protocol , 44-49 , IEEE,
Figure 8 : Combined graph
AUG 2007.
Figure 8 shows the comparison of all the [13] Silvio Croce, Francesco Marcelloni and Massimo Vecchio , Reducing
transmission loads. It is the combination of all the preceding Power Consumption in Wireless Sensor Networks Using a Novel
graphs thus showing the reduced transmission load of the Approach to Data Aggregation , The Computer Journal Advance Access
published online on July 11, 2007.
proposed system. [13] Hung-Ta Pai and Yunghsiang S. Han, Power-Efficient Data fusion
Assurance Using Direct Voting Mechanism in Wireless Sensor Networks,
VIII. CONCLUSION Proceedings of the IEEE International Conference on Sensor Networks,
Ubiquitous, and Trustworthy Computing (SUTC’06), July 2006 .
[14] Petrovic D, Shah RC, Ramachandran K, Rabaey J,” Data funneling:
Power consumption plays a vital role in WiMAX routing with aggregation and compression for Wireless Sensor Networks”,
networks. The proposed mechanism conserves power to a Proceeding of the IEEE International Workshop on sensor Network
greater extent by reducing the unnecessary transmissions. The Protocols and Applications(SNPA-03), May 2003.
Clustering technique used here avoids the depletion of energy [15] Lindsey S, Raghavendra C, Sivalingam K, “Data gathering in Sensor
Networks using the energy Delay Metric”, In proceeding of the IPDPS
to a greater extent. The amount of traffic in the network is Workshop on Issues in Wireless Networks and Mobile Computing, 2001.
very much reduced as only the aggregate value is transmitted [16] Shakkottai S, Srikant R, Shroff N, “Unreliable Sensor grids: coverage,
instead of the entire set of the fusion data. Only on request by connectivity and diameter”, In proceeding of the IEEE INFOCOM 2003.
the Base Station will the group head send the data. Only Anti- [17] Du X.Xiao Y, “Energy efficient chessboard clustering and routing in
heterogonous sensor network”, International Journal of Wireless and
votes are sent. Compared to SEDAN, this system is energy Mobile Computing (IJWMC), in print.
efficient, as the data or the keys do not get appended. When [18] Doherty L, Ghaoni LE, Pister KSJ ,”Convex Position estimation in
compared to Witness-Based approach and Direct-Voting,, to wireless sensor networks”, In proceedings of IEEE Infocom 2001,
avoid the compromise of the group heads, each node has its Anchorage, AK, April 2001.
[19] Savvides A, Han C, Strivastava M, ”Dynamic fine-grained localization
own private and public keys. The keys are not transmitted in in ad-hoc networks of sensors”, In proceedings of ACM
the network. So the attacks and the corruption of the keys are MOBICOM’01,ACM press, 2001,pp.166-179.
avoided. To crown it all, this proposed method provides a
secured transfer of data as well as avoids re-transmission.
This work can be extended to a mobile environment (with AUTHOR’S PROFILE
multiple levels) with many group heads in between the Base
Station and the event sensing nodes at the lowest level. M. Deva Priya received her Batchelor of Engineering
Degree in Computer Science and Engineering with
REFERENCES distinction in 2005 from Maharaja Engineering College,
[1] Claudio Cicconetti, Alessandro Erta, Luciano Lenzini, and Enzo
Coimbatore and her Master of Engineering Degree with
Mingozzi, “Performance Evaluation of the IEEE 802.16 MAC for QoS Distinction in Computer Science and Engineering from
Support”, IEEE Transactions On Mobile Computing, Vol. 6, No. 1, Kumaraguru College of Technology, Coimbatore, Tamil
January 2007. Nadu, India in 2007. She is currently pursuing her research in
[2] Sheng-Tzong Cheng, Bo-Fu Chen, and Chih-Lun Chou, “Fairness-based
Scheduling Algorithm for TDD Mode IEEE 802.16 Broadband Wireless
Wireless Networks-WiMAX. She has 3 years of teaching
Access Systems”, 2008 IEEE Asia-Pacific Services Computing experience and is currently working as a Senior Lecturer in
Conference . the Department of Computer Science and Engineering,
[3] Francesco De Pellegrini, Daniele Miorandi, Elio Salvadori and Nicola Manakula Vinayagar Institute of Technology, Puducherry,
Scalabrino ,“QoS Support in Wimax Networks: Issues and Experimental
Measurements”.
India.
[4] Yanchao Zhang, and Yuguang Fang, “ARSA: An Attack-Resilient
Security Architecture for Multihop Wireless Mesh Networks”, IEEE J.Sengathir received his B.Tech Degree in Computer
Journal on selected areas in Communications, Vol. 24, No. 10, October Science and Engineering with distinction in 2005 from
2006.
[5] Huseyin Ozgur Tan and Ibrahim Korpeoglu, “Power Efficient Data
Pondicherry University and his M.Tech Degree with
Gathering and Aggregation in Wreless Sensor Network”, SIGMOD Distinction in Information and Security from Pondicherry
Record, Vol. 32, No. 4, Dec. 2003. Engineering College, Pondicherry, India in 2009. He is