Professional Documents
Culture Documents
CWSN
CWSN
Presented By
Swapnil S. Jagtap
Under The Guidance of
Guide Name
1 Introduction
2 Literature Survey
3 Motivation
5 Proposed Protocols
6 Comparison
7 Conclusion
8 References
Introduction
Setup: The BS generates a master key msk and public parameters param
for the private key generator (PKG), and gives them to all sensor nodes.
Verification: Given the ID, M and SIG, the receiving node (CH node)
outputs “accept”if SIG is valid, and outputs “reject”otherwise.
Setup phase
Step 1. BS ⇒ Gs : hIDbs , Ts , noncei
Step 2. CHi ⇒ Gs : hIDi , Ts , adv, σi , ci i
Step 3. Lj → CHi : hIDi , IDj , Ts , join, σj , cj i
Step 4. CHi ⇒ Gs : hIDi , T s, sched(IDj /tj ), σi , ci i
Steady state phase
Step 5. Lj → CHi : hIDi , IDj , tj , C, σj , cj i
Step 6. CHi → BS : hIDbs , IDi , Ts , F, σi , ci i
Setup: The BS generates a master key msk and public parameters param
for the private key generator (PKG), and gives them to all sensor nodes.
Online signing : From the private key sekID , SIGof f line and message
M, a sending node (leaf node) generates an online signature SIGonline .
Verification: Given ID, M and SIGonline , the receiving node (CH node)
outputs “accept”if SIGonline is valid, and outputs “reject”otherwise.
Setup phase
Step 1. BS ⇒ Gs : hIDbs , Ts , noncei
Step 2. CHi ⇒ Gs : hIDi , Ts , adv, σi , zi i
Step 3. Lj → CHi : hIDi , IDj , Ts , join, σj , zj i
Step 4. CHi ⇒ Gs : hIDi , T s, alloc(IDj /tj /σbj ), σi , zi i
Steady state phase
Step 5. Lj → CHi : hIDi , IDj , tj , C, σj , zj i
Step 6. CHi → BS : hIDbs , IDi , Ts , F, σi , zi i
For SET-IBS,
|IDj | + |ti | + |C| + |σj | + |h(Ckti kθ)|
where,
|IDj | and |ti | are 2 bytes
|C| is 20 bytes
and the hash value |h(Ckti kθ)| is 20 bytes
The total message size is 44+|σj | bytes in SET-IBS.
For SET-IBOOS,
|IDj | + |tj | + |C| + |σj | + |zj |
where,
|σj | + |zj | is the online signature of size 2 bytes
The total message size is 46 bytes in SET-IBOOS.
We first studied about the wireless sensor nodes and then the wireless
sensor networks. We then studied two secure and efficient data transmission
protocols for CWSNs, SET-IBS and SET-IBOOS which are efficient in
communication and which achieves security requirements in CWSNs.
1 Huang Lu, Jie Li, and Mohsen Guizani, “Secure and Efficient Data
Transmission for Cluster-based Wireless Sensor Networks,”IEEE Trans.
on Parallel and Distributed Systems, 2012.
2 Y.Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues
in Wireless Sensor Networks,”IEEE Commun. Surveys Tuts., vol. 8, no.
2, 2006.
3 W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An
application-specific protocol architecture for wireless microsensor
networks,”IEEE Trans. Wireless Commun., vol. 1, no. 4, 2002.
4 A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An analytical model for
information retrieval in wireless sensor networks using enhanced
APTEEN protocol,”IEEE Trans. Parallel Distrib. Syst., vol. 13, 2002.
5 P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performance
analysis of a secure clustering protocol for sensor networks,”in Proc.
IEEE NCA, 2007.