SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 102 
SECURING INFORMATION IN WIRELESS SENSOR NETWORKS Prashant Sangulagi1, Mohan G2 1Department of ECE, BKIT Bhalki, Karnataka INDIA: 585328 2Department of ECE, BKIT Bhalki, Karnataka INDIA: 585328 Abstract Security in Wireless sensor Network has emerged a must required research topic for the researchers. Securing the important data without affecting its accuracy is a important task. In this paper some of the important and feasible security techniques are discussed. Some of the standard and popular encryption techniques are Digital Encryption Systems (DES) and Advanced Encryption systems (AES). Attacks considered in the WSN environment are more, some of the main type like active attacks and passive attacks. Here, attacks in WSN are discussed in details and avoidance of those attacks using encryption techniques are also discussed here. This paper also analyzes the performance of DES and AES algorithms against the attacks in WSN. Keywords: WSN, Network Security, Attacks, Cryptography, DES, AES. 
---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION The aim of this paper is to provide secure data communication using DES and AES security algorithm for wireless sensor network. Wireless sensor networks are quickly gaining popularity due to the fact that they are potentially low cost solutions to a variety real of world- challenges. Their low cost provide a means to deploy large sensor arrays in a variety conditions capable of performing both military and civilian tasks. But sensor network also introduce severe resource constants due their lack of data storage and power. Both of these represent major obstacles to the implementation of traditional computer security techniques in a wireless sensor network. Unreliable communication channel and unattended operation make security defences even harder. Indeed, as pointed out in wireless sensors often have the processing characteristics of machines that are decades old, and the trend is to reduce the cost of wireless sensors while maintaining similar computing power. With that in mind, many researchers have begun to address the challenges of maximizing the processing capabilities and energy reserve of wireless sensor nodes while also securing them against attackers. All aspects of wireless sensor networks are examined including secure and efficient routing, data aggregation, group formation and so on. 1.1 Issues and Challenges in Designing a Sensor Network Sensor networks pose certain design challenges due to the following reasons: 1. Sensor nodes are randomly deployed and hence do not fit into any regular topology. 2. Sensor network are infrastructure-less. Therefore, all routing and maintenance algorithm need to be distributed. 3. Sensors usually rely only on their battery power, 4. Sensor nodes should be able to synchronize with each other. 
5. Sensor network should also be capable of adapting to changing the connectivity due to the failure of nodes, or new powering up. 
Organization of the paper is as follows, section two describes the overall methodology in network security, section 3 gives detailed information regarding attacks in WSN, section 4 provides information regarding cryptography and section 5 and 6 explains DES and AES algorithms and lastly section 7 concludes the paper. 2. NETWORK SECURITY Having discussed some of the attacks that have occurred in real life, let us now classify the principles related to security. This will help us understand the attacks better and also help us in thinking about the possible solution to take them. There are four chief principle of security. And two more, access control and availability. Which are not related to a particular message, but are linked to the overall system as a whole. We shall discuss all these security principles as follow. 2.1 Confidentiality: The principle of confidentiality specifies that only sender and receiver should be Understand the contents of the transmitted message. 2.2 Authentication: The principles of authentication mechanisms help establish proof of identities. The authentication process ensures that the origin of a electronic message or document correctly identify.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 103 
2.3 Integrity: When the contents of a message are changed after the sender sends it, but before it reaches the intended receiver, we say that the integrity of the message is lost. 2.4 Non-Repudiation: There are situation where a user sends a message and later on refuses that she had sent that message. 2.5 Access Control: The principle of access control determines who should be able to access what. For instance, we should be able to specify that user A can view the records in a data base, but cannot update them. However, user B might be allowed to make updates as well. An access control mechanism can be set up to ensure this. 3.TYPES OF ATTACKS 
Fig. 1 types of attacks 3.1 Passive Attacks: Passive attacks are those, wherein the attacker a indulges in monitoring data transmission. In other words, the attacker aims to obtain information that is in transit. The term passive indicates that the attacker does not attempt to perform any modifications to the data. In fact, this is also why passive attacks are harder to detect. Thus, the general approach to deal with passive attacks is to think about prevention, rather than detection or corrective actions. Passive attacks do not involve any modification to the contents of an original message. 3.2 Active Attacks: 
Unlike passive attacks, the active attacks are based on modification of the original message in some manner or the creation of a false message. These attacks cannot be prevented easily. However, they can detect with some effort and attempts can be made to recover from them. These attacks can in the form of interruption, modification and fabrication. 
In active attacks, the contents of the original message are modified in some way. 
 Trying to pose as another entity involves masquerade attacks. 
 Modification attacks can classified further into replay attacks and alteration of messages. 
 Fabrication causes denial of service attack. 
3.3 Types of Passive Attacks: 
Fig. 2types of passive attacks 
 Release of Message Contents: 
Release of message contents is quite simple to understand. When we send a confidential email message to our friend we desire that only she be the able to access it. Otherwise, the contents of the messages are released against wishes to someone else. Using certain security mechanisms, we can prevent release of message contents. 
 Traffic Analysis: 
However, if many such messages passing through, a passive attacker could try to figure out similarities between them to come up with some sort pattern that provide her some clues regarding the communication that is taking place. Such attempts of analyzing message to come up with likely patterns are the of the traffic analysis attacks. 3.4 Types of Active Attacks: 
Fig 3: Types of active attacks 
attacks 
active attacks 
passive attacks 
passive attacts(interception) 
release of message contents 
trafic analysis 
active attacks 
interruption 
modification 
fabrication
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 104 
 Interruption: 
Interruption caused when an unauthorized entity pretends to be another entity. 
 Modification: Modification attacks can be classified further into replay attacks and alteration of messages. 
 Fabrication: Fabrication attacks make an attempt to prevent legitimate users from accessing some services, which they are eligible for. For instance, an unauthorized user might send too many login requests to a server using random user ids one after the other in quick succession, so as to flood the network and deny other legitimate users from using the network facilities. 
4 WHAT IS CRYPTOGRAPHY? Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, and Accuracy 4.1 Cryptography Algorithm 
Fig 4: cryptographic components 
Suppose now that “a” wants to send a message to “b”. Ad’s message in its original form (for example, “b”, hello. “a”) is known as plaintext, or clear text. “a” encrypts his plaintext message using an encryption algorithm so that the encrypted message, known as cipher text, looks unintelligible to any intruder. Interestingly, in many modern cryptographic system, including those used in the internet, the encryption technique itself is known-published, standardized, and available to everyone (for example,[RFC 1321;RFC 2437: RFC 2420; NIST 2001]), even a potential intruder! Clearly, if everyone knows the method for encoding data, then there must be some secret information that prevents an intruder from decrypting the transmitted data. This is where keys come in 5. DATA ENCRYPTION STANDARD: The algorithm described by DES is a private-key algorithm, meaning that, both sender and receiver must know and use same private key is used for both encrypting and decrypting the data. DES encrypts and decrypts data in 64-bit blocks, using a 64- bit key (although the effective key Strength is only 56 bits, as explained below). It takes a 64-bit block of plaintext as input and outputs a 64-bit block of cipher text. Since it always operates on blocks of equal size and it uses both permutations and substitutions in the algorithm, DES is both a block cipher and a productcipher.DES has 64-bit rounds, meaning the main algorithm is repeated 16 times to produce the cipher text. It has been found that the number of rounds is exponentially proportional to the amount of time required to find a key using a brute-force attack. So as the number of rounds increases, the security of the algorithm increases exponentially. Steps in DES: 1. In the first step, 64-bit plain text block is handed over to an initial permutation function. 2. The initial permutation is performed on plain text. 3. Next, the initial permutation produces two halves of permuted block; say left plain text and right plain text. 4. Now, each of left plain text and right plain text go through 16 rounds of encryption process. 5. In the end, left plain text and right plain text are rejoined and a final permutation is performed on the combined block. 6. The result of this process produces 64-bit cipher text. 5.1 Advanced Encryption Standard: The algorithm described by AES is a symmetric-key algorithm meaning that same key is used for both encrypting and decrypting the data. The AES standard is a variant where the block size is restricted to 128 bits and key size of 128, 192, 256 bits can be used. AES is a symmetric cipher that processes data in 128-bit blocks. It supports key sizes of 128, 192, and 256bits and consists of 10, 12, or 14 iteration rounds, respectively. Each round mixes the data with a round key, which is generated from the encryption key. The encryption round operations are presented in Fig 5.1. The cipher maintains an Internal, 4-by-4 matrix of bytes, called State, on which the operations are performed. Initially State is filled with the input data block and XOR-ed with the encryption key.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 105 
Permute 
48-bit k1 
48-bit K2 
. . 
. 
48-bit k16 
Permute 
Fig. 5: Basic operation of DES 
64-bit input 
56-bit key 
L1 
R1 
L2 
R2 
L3 
R3 
L17 
R17 
64-bit output 
f(L1,R1,K1) 
f(L2,R2,K2) 
64-bit input
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 106 
Fig 6 Round operation of AES encryption 6. ADVANTAGES AND APPLICATION 6.1 Advantages 
1. Network security facilitates protection of information that is shared between computers on the network. 
2. Hacking attempts or virus attacks from the internet will not be able to harm physical computers. External possible attacks are prevented. 
3. Network security provides different levels of access. If there are various computers attached to a network, there may be some computers that may have greater access to information than others. 
4. Private network can be provided protection from external attacks by closing them off from internet. Network security make them safe them virus attacks, etc 
6.2 Applications Sensor nodes are used in a variety of applications which require constant monitoring and detection of specific events. The most security-oriented applications of WSN are. 
1. Military applications 
2. Sensors are also used in environmental applications such as forest fire detection 
3. Sensor can be extremely useful in medical applications. 
4. Sensor also useful in commercial applications at home and industries 
7. CONCLUSIONS 
From this survey paper we can conclude that DES and AES are advanced security algorithm which provides secure or accurate information about sensed data in wireless sensor network. AES is a most dominant algorithm in wireless sensor network for coming decades like security oriented-applications such as military, medical, fire detection and home automations and variety of applications which require constant monitoring detection of specific event. 
REFERENCE 
[1]. Atulkahate, “Cryptography and network security” second edition, 
[2]. James F. Kurose, “Computer networking”, [3]. Adrian Perrig, John Stankovic, David Wagner, “Security in Wireless Sensor Networks”Communications of the ACM, Page53-57, year 2004 [4].Al-SakibKhan Pathan, Hyung-Woo Lee, ChoongSeon Hong, “Security in Wireless SensorNetworks: Issues and Challenges”, International conference on Advanced ComputingTechnologies, Page1043-1045, year 2006 [5]. A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public keycryptographyfor wireless sensor networks," in Third IEEE International Conference on Pervasive Computing and Communications (PERCOM'05). IEEE Computer Society Press, 2005, pp. 324- 328

More Related Content

PDF
Network and cyber security module(15ec835, 17ec835)
PDF
Network security 10EC832 vtu notes
PDF
Enhancement in network security with security
PDF
Enhancement in network security with security protocols
PDF
VTU network security(10 ec832) unit 6 notes
PDF
Vtu network security(10 ec832) unit 1 notes
PDF
Vtu network security(10 ec832) unit 2 notes..
PDF
Vtu network security(10 ec832) unit 5 notes.
Network and cyber security module(15ec835, 17ec835)
Network security 10EC832 vtu notes
Enhancement in network security with security
Enhancement in network security with security protocols
VTU network security(10 ec832) unit 6 notes
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 5 notes.

What's hot (19)

PDF
Security Analysis and Improvement for IEEE 802.11i
PDF
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
PDF
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
PDF
Vtu network security(10 ec832) unit 3 notes.
DOCX
Efficient authentication for mobile and pervasive computing
PDF
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
PDF
An efficient approach for secured communication in wireless sensor networks
PDF
A Review Study on Secure Authentication in Mobile System
PDF
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
PDF
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
PDF
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
PDF
A Self –Destructing Secure Messaging System Using Multi Key Management Scheme
DOCX
efficient authentication for mobile and pervasive computing
PPTX
Privacy & Security Aspects in Mobile Networks
PDF
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
PDF
Network Security & Attacks
PPTX
Security services and mechanisms
PPTX
Efficient authentication for mobile and pervasive computing
Security Analysis and Improvement for IEEE 802.11i
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
Vtu network security(10 ec832) unit 3 notes.
Efficient authentication for mobile and pervasive computing
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
An efficient approach for secured communication in wireless sensor networks
A Review Study on Secure Authentication in Mobile System
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
A Self –Destructing Secure Messaging System Using Multi Key Management Scheme
efficient authentication for mobile and pervasive computing
Privacy & Security Aspects in Mobile Networks
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Network Security & Attacks
Security services and mechanisms
Efficient authentication for mobile and pervasive computing
Ad

Viewers also liked (20)

PPTX
Wireless_Sensor_security
TXT
Seminartopics.docx
PDF
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
PPTX
Satellite
PPTX
Acoustic communication using ofdm
PDF
CPU vs. GPU presentation
PPT
security in wireless sensor networks
PPT
Stratellite 2015
PPTX
GRAPHICS PROCESSING UNIT (GPU)
PPTX
Wireless power transmission through sps
PPTX
Graphic Processing Unit (GPU)
PDF
300 seminar topics
PPTX
Graphics processing unit ppt
DOCX
stratellite document
PPTX
Wireless power transmission from solar power satellite
PPT
MIMO OFDM
PPTX
Wsn ppt original
PPT
Stratellites - Satellites in Stratosphere
PPTX
Underwater communication
PPTX
telecommunication-ppt
Wireless_Sensor_security
Seminartopics.docx
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Satellite
Acoustic communication using ofdm
CPU vs. GPU presentation
security in wireless sensor networks
Stratellite 2015
GRAPHICS PROCESSING UNIT (GPU)
Wireless power transmission through sps
Graphic Processing Unit (GPU)
300 seminar topics
Graphics processing unit ppt
stratellite document
Wireless power transmission from solar power satellite
MIMO OFDM
Wsn ppt original
Stratellites - Satellites in Stratosphere
Underwater communication
telecommunication-ppt
Ad

Similar to Securing information in wireless sensor networks (20)

PDF
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
PPTX
PROTOCOL MECHNISM FOR SECURITY ppt
PPTX
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
PDF
IRJET- Coordinates based Keying Scheme for WSN Security
PDF
Wireless networks security
PPT
Cryptography introduction
PPT
Paper1
PDF
A01450131
PPTX
Unit-1.pptx
PPT
CNS Unit-I_final.ppt
PPTX
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
PPTX
Cryptography and Network Security-ch1-4.pptx
PPT
Module-1.ppt cryptography and network security
PPT
Security in wireless sensor networks
PPTX
Mobile slide
PDF
Chapter 1- Fundamentals of Cryptography.pdf
PDF
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
PPTX
cyber security attacks cyber security attacks
PPTX
Cyber security
PPTX
Network Security and Cryptography
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
PROTOCOL MECHNISM FOR SECURITY ppt
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
IRJET- Coordinates based Keying Scheme for WSN Security
Wireless networks security
Cryptography introduction
Paper1
A01450131
Unit-1.pptx
CNS Unit-I_final.ppt
cryptography_and_Network_Security_fuck_scribd_scribd_will_go_to_hell.pptx
Cryptography and Network Security-ch1-4.pptx
Module-1.ppt cryptography and network security
Security in wireless sensor networks
Mobile slide
Chapter 1- Fundamentals of Cryptography.pdf
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
cyber security attacks cyber security attacks
Cyber security
Network Security and Cryptography

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...

Recently uploaded (20)

PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
web development for engineering and engineering
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Construction Project Organization Group 2.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
PPT on Performance Review to get promotions
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT
Project quality management in manufacturing
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Automation-in-Manufacturing-Chapter-Introduction.pdf
CH1 Production IntroductoryConcepts.pptx
Geodesy 1.pptx...............................................
CYBER-CRIMES AND SECURITY A guide to understanding
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Internet of Things (IOT) - A guide to understanding
Foundation to blockchain - A guide to Blockchain Tech
bas. eng. economics group 4 presentation 1.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
web development for engineering and engineering
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Construction Project Organization Group 2.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Operating System & Kernel Study Guide-1 - converted.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT on Performance Review to get promotions
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Project quality management in manufacturing

Securing information in wireless sensor networks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 102 SECURING INFORMATION IN WIRELESS SENSOR NETWORKS Prashant Sangulagi1, Mohan G2 1Department of ECE, BKIT Bhalki, Karnataka INDIA: 585328 2Department of ECE, BKIT Bhalki, Karnataka INDIA: 585328 Abstract Security in Wireless sensor Network has emerged a must required research topic for the researchers. Securing the important data without affecting its accuracy is a important task. In this paper some of the important and feasible security techniques are discussed. Some of the standard and popular encryption techniques are Digital Encryption Systems (DES) and Advanced Encryption systems (AES). Attacks considered in the WSN environment are more, some of the main type like active attacks and passive attacks. Here, attacks in WSN are discussed in details and avoidance of those attacks using encryption techniques are also discussed here. This paper also analyzes the performance of DES and AES algorithms against the attacks in WSN. Keywords: WSN, Network Security, Attacks, Cryptography, DES, AES. ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION The aim of this paper is to provide secure data communication using DES and AES security algorithm for wireless sensor network. Wireless sensor networks are quickly gaining popularity due to the fact that they are potentially low cost solutions to a variety real of world- challenges. Their low cost provide a means to deploy large sensor arrays in a variety conditions capable of performing both military and civilian tasks. But sensor network also introduce severe resource constants due their lack of data storage and power. Both of these represent major obstacles to the implementation of traditional computer security techniques in a wireless sensor network. Unreliable communication channel and unattended operation make security defences even harder. Indeed, as pointed out in wireless sensors often have the processing characteristics of machines that are decades old, and the trend is to reduce the cost of wireless sensors while maintaining similar computing power. With that in mind, many researchers have begun to address the challenges of maximizing the processing capabilities and energy reserve of wireless sensor nodes while also securing them against attackers. All aspects of wireless sensor networks are examined including secure and efficient routing, data aggregation, group formation and so on. 1.1 Issues and Challenges in Designing a Sensor Network Sensor networks pose certain design challenges due to the following reasons: 1. Sensor nodes are randomly deployed and hence do not fit into any regular topology. 2. Sensor network are infrastructure-less. Therefore, all routing and maintenance algorithm need to be distributed. 3. Sensors usually rely only on their battery power, 4. Sensor nodes should be able to synchronize with each other. 5. Sensor network should also be capable of adapting to changing the connectivity due to the failure of nodes, or new powering up. Organization of the paper is as follows, section two describes the overall methodology in network security, section 3 gives detailed information regarding attacks in WSN, section 4 provides information regarding cryptography and section 5 and 6 explains DES and AES algorithms and lastly section 7 concludes the paper. 2. NETWORK SECURITY Having discussed some of the attacks that have occurred in real life, let us now classify the principles related to security. This will help us understand the attacks better and also help us in thinking about the possible solution to take them. There are four chief principle of security. And two more, access control and availability. Which are not related to a particular message, but are linked to the overall system as a whole. We shall discuss all these security principles as follow. 2.1 Confidentiality: The principle of confidentiality specifies that only sender and receiver should be Understand the contents of the transmitted message. 2.2 Authentication: The principles of authentication mechanisms help establish proof of identities. The authentication process ensures that the origin of a electronic message or document correctly identify.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 103 2.3 Integrity: When the contents of a message are changed after the sender sends it, but before it reaches the intended receiver, we say that the integrity of the message is lost. 2.4 Non-Repudiation: There are situation where a user sends a message and later on refuses that she had sent that message. 2.5 Access Control: The principle of access control determines who should be able to access what. For instance, we should be able to specify that user A can view the records in a data base, but cannot update them. However, user B might be allowed to make updates as well. An access control mechanism can be set up to ensure this. 3.TYPES OF ATTACKS Fig. 1 types of attacks 3.1 Passive Attacks: Passive attacks are those, wherein the attacker a indulges in monitoring data transmission. In other words, the attacker aims to obtain information that is in transit. The term passive indicates that the attacker does not attempt to perform any modifications to the data. In fact, this is also why passive attacks are harder to detect. Thus, the general approach to deal with passive attacks is to think about prevention, rather than detection or corrective actions. Passive attacks do not involve any modification to the contents of an original message. 3.2 Active Attacks: Unlike passive attacks, the active attacks are based on modification of the original message in some manner or the creation of a false message. These attacks cannot be prevented easily. However, they can detect with some effort and attempts can be made to recover from them. These attacks can in the form of interruption, modification and fabrication. In active attacks, the contents of the original message are modified in some way.  Trying to pose as another entity involves masquerade attacks.  Modification attacks can classified further into replay attacks and alteration of messages.  Fabrication causes denial of service attack. 3.3 Types of Passive Attacks: Fig. 2types of passive attacks  Release of Message Contents: Release of message contents is quite simple to understand. When we send a confidential email message to our friend we desire that only she be the able to access it. Otherwise, the contents of the messages are released against wishes to someone else. Using certain security mechanisms, we can prevent release of message contents.  Traffic Analysis: However, if many such messages passing through, a passive attacker could try to figure out similarities between them to come up with some sort pattern that provide her some clues regarding the communication that is taking place. Such attempts of analyzing message to come up with likely patterns are the of the traffic analysis attacks. 3.4 Types of Active Attacks: Fig 3: Types of active attacks attacks active attacks passive attacks passive attacts(interception) release of message contents trafic analysis active attacks interruption modification fabrication
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 104  Interruption: Interruption caused when an unauthorized entity pretends to be another entity.  Modification: Modification attacks can be classified further into replay attacks and alteration of messages.  Fabrication: Fabrication attacks make an attempt to prevent legitimate users from accessing some services, which they are eligible for. For instance, an unauthorized user might send too many login requests to a server using random user ids one after the other in quick succession, so as to flood the network and deny other legitimate users from using the network facilities. 4 WHAT IS CRYPTOGRAPHY? Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, and Accuracy 4.1 Cryptography Algorithm Fig 4: cryptographic components Suppose now that “a” wants to send a message to “b”. Ad’s message in its original form (for example, “b”, hello. “a”) is known as plaintext, or clear text. “a” encrypts his plaintext message using an encryption algorithm so that the encrypted message, known as cipher text, looks unintelligible to any intruder. Interestingly, in many modern cryptographic system, including those used in the internet, the encryption technique itself is known-published, standardized, and available to everyone (for example,[RFC 1321;RFC 2437: RFC 2420; NIST 2001]), even a potential intruder! Clearly, if everyone knows the method for encoding data, then there must be some secret information that prevents an intruder from decrypting the transmitted data. This is where keys come in 5. DATA ENCRYPTION STANDARD: The algorithm described by DES is a private-key algorithm, meaning that, both sender and receiver must know and use same private key is used for both encrypting and decrypting the data. DES encrypts and decrypts data in 64-bit blocks, using a 64- bit key (although the effective key Strength is only 56 bits, as explained below). It takes a 64-bit block of plaintext as input and outputs a 64-bit block of cipher text. Since it always operates on blocks of equal size and it uses both permutations and substitutions in the algorithm, DES is both a block cipher and a productcipher.DES has 64-bit rounds, meaning the main algorithm is repeated 16 times to produce the cipher text. It has been found that the number of rounds is exponentially proportional to the amount of time required to find a key using a brute-force attack. So as the number of rounds increases, the security of the algorithm increases exponentially. Steps in DES: 1. In the first step, 64-bit plain text block is handed over to an initial permutation function. 2. The initial permutation is performed on plain text. 3. Next, the initial permutation produces two halves of permuted block; say left plain text and right plain text. 4. Now, each of left plain text and right plain text go through 16 rounds of encryption process. 5. In the end, left plain text and right plain text are rejoined and a final permutation is performed on the combined block. 6. The result of this process produces 64-bit cipher text. 5.1 Advanced Encryption Standard: The algorithm described by AES is a symmetric-key algorithm meaning that same key is used for both encrypting and decrypting the data. The AES standard is a variant where the block size is restricted to 128 bits and key size of 128, 192, 256 bits can be used. AES is a symmetric cipher that processes data in 128-bit blocks. It supports key sizes of 128, 192, and 256bits and consists of 10, 12, or 14 iteration rounds, respectively. Each round mixes the data with a round key, which is generated from the encryption key. The encryption round operations are presented in Fig 5.1. The cipher maintains an Internal, 4-by-4 matrix of bytes, called State, on which the operations are performed. Initially State is filled with the input data block and XOR-ed with the encryption key.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 105 Permute 48-bit k1 48-bit K2 . . . 48-bit k16 Permute Fig. 5: Basic operation of DES 64-bit input 56-bit key L1 R1 L2 R2 L3 R3 L17 R17 64-bit output f(L1,R1,K1) f(L2,R2,K2) 64-bit input
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014, Available @ http://www.ijret.org 106 Fig 6 Round operation of AES encryption 6. ADVANTAGES AND APPLICATION 6.1 Advantages 1. Network security facilitates protection of information that is shared between computers on the network. 2. Hacking attempts or virus attacks from the internet will not be able to harm physical computers. External possible attacks are prevented. 3. Network security provides different levels of access. If there are various computers attached to a network, there may be some computers that may have greater access to information than others. 4. Private network can be provided protection from external attacks by closing them off from internet. Network security make them safe them virus attacks, etc 6.2 Applications Sensor nodes are used in a variety of applications which require constant monitoring and detection of specific events. The most security-oriented applications of WSN are. 1. Military applications 2. Sensors are also used in environmental applications such as forest fire detection 3. Sensor can be extremely useful in medical applications. 4. Sensor also useful in commercial applications at home and industries 7. CONCLUSIONS From this survey paper we can conclude that DES and AES are advanced security algorithm which provides secure or accurate information about sensed data in wireless sensor network. AES is a most dominant algorithm in wireless sensor network for coming decades like security oriented-applications such as military, medical, fire detection and home automations and variety of applications which require constant monitoring detection of specific event. REFERENCE [1]. Atulkahate, “Cryptography and network security” second edition, [2]. James F. Kurose, “Computer networking”, [3]. Adrian Perrig, John Stankovic, David Wagner, “Security in Wireless Sensor Networks”Communications of the ACM, Page53-57, year 2004 [4].Al-SakibKhan Pathan, Hyung-Woo Lee, ChoongSeon Hong, “Security in Wireless SensorNetworks: Issues and Challenges”, International conference on Advanced ComputingTechnologies, Page1043-1045, year 2006 [5]. A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public keycryptographyfor wireless sensor networks," in Third IEEE International Conference on Pervasive Computing and Communications (PERCOM'05). IEEE Computer Society Press, 2005, pp. 324- 328