DISSERTATION_heena.docx

Embed Size (px)

Citation preview

  • 8/10/2019 DISSERTATION_heena.docx

    1/87

    SECURE ROUTING IN WIRELESS SENSOR

    NETORK

    Dissertation Submitted in the partial fulfilment of the requirements for the award

    of degree of

    Master of Engineering

    In

    Computer Science & Engineering

    Submitted By:

    HEENA SINGH

    (1202062037)

    Under the guidance of

    Prof.(Dr.) Naveen Hemrajani

    Head of Department

    2012-2014

    COMPUTER SCIENCE AND ENGINEERING DEPARTMENT

    JECRC UNIVERSITY, JAIPUR

  • 8/10/2019 DISSERTATION_heena.docx

    2/87

    CERTIFICATE

    This is to certify that the work in this dissertation entitled Secure Routing In

    Wireless Sensor Networks submitted by Miss. Heena Singh in partial fulfillment ofthe requirements for the award of the degree of Master of Technology in Computer

    Science & Engineering during the session 2012-2014 in the Department ofComputer Science & Engineering, JECRC University, Jaipur is an authentic work

    carried out by her under my supervision and guidance.

    To the best of my knowledge, the matter presented in this dissertation has not beensubmitted to any other University/Institute for the award of any Degree.

    Prof. ( Dr.) Naveen Hemrajani

    Head Of DepartmentComputer Science & Engineering

    JECRC UniversityJaipur, Rajasthan

    Department of Computer Science and Engineering

    JECRC UNIVERSITY, JAIPUR, RAJASTHAN,

    303905

  • 8/10/2019 DISSERTATION_heena.docx

    3/87

    DECLARATION BY STUDENT

    Hereby I declare, that this dissertation is my original authorial work, which I haveworked out by my own. All sources, references and literature used or excerpted

    during elaboration of this work are properly cited and listed in complete referenceto the due source.

    Heena Singh

    M.Tech

    CSE

  • 8/10/2019 DISSERTATION_heena.docx

    4/87

    ACKNOWLEDGMENT

    My first thanks are to Almighty God, without whose blessings I wouldnt have beenwriting these acknowledgements.

    I then would like to express my heartfelt thanks to my guide, Prof . (Dr .) NaveenHemrajani , Head of Department of Computer Science & Engineering, for givingme the guidance, encouragement, counsel throughout my research and reading my

    reports and my research papers. He has helped me to explore this vast topic in an

    organized manner and provided me with all the ideas on how to work towards aresearch oriented venture. Without his invaluable advice and assistance it would

    not have been possible for me to complete this dissertation.

    I am also thankful to Mr. Ajay Kumar, for providing me help and support.

    I would also like to thank the staff members and my colleagues who were always

    there in the need of the hour and provided with all the help and facilities, which Irequired, for the completion of my dissertation.

    Most importantly, I would like to thank my Parents and the Almighty for showing

    me the right direction out of the blue, to help me stay calm in the oddest of the

    times and keep moving even at times when there was no hope.

    Finally, I would like to thank all of them whose names are not mentioned herebut have helped me in any way to accomplish the work.

    HEENA SINGH

  • 8/10/2019 DISSERTATION_heena.docx

    5/87

    ABSTRACT

    Wireless networks of miniaturized, low-power sensor/actuator devices are poised to become

    widely used in commercial and military environments. The communication security problems for

    these networks are exacerbated by the limited power and energy of the sensor devices. WSN

    generally deployed in natural environment hence a large number of security issues are there. In

    many sensor network applications, security and privacy of the data collected will be a critical

    concern. Providing security services for sensor networks is a technical challenge. In order to

    protect the data in WSN require more techniques for making data transmission more secure from

    the attackers. The proposed work describes the design and implementation of sensor deployment,

    master node selection, and dissemination of authenticated messages into the network to improve

    the secure communication among them. Frequent update of node information in the database;support the secure communication under very limiting energy. In addition, it selects highly

    energetic shortest routes that have authenticated nodes for data transmission. Thus, the proposed

    work improves the performance by exploiting multiple highly energetic shortest paths with

    authenticated routers.

    OBJECTIVES

    To improve the secure sensor communication, deploy the sensor network andselect a sender called Master Node which is considered as an authenticated

    node from the network.

    To maintain the database for both authenticated and unauthenticated nodes

    accurately using the dissemination of authenticated detection messages

    To select the highly energetic and shortest paths having authenticated routers to

    reach the sink node

  • 8/10/2019 DISSERTATION_heena.docx

    6/87

  • 8/10/2019 DISSERTATION_heena.docx

    7/87

    4. Requirement Analysis/ Background of Work

    4.1Design Specifications

    4.2 Details of Hardware /Software/ Platform to be used for Experimentations

    5. Experimental Analysis and Results

    5.1 Final Objective

    5.2 Experimentations carried out towards meeting final Objectives

    5.3 Result and Discussion on whether and to what extent the objectives are met

    5.4 Future Planning

    6. Conclusion

    References

    Bibliography

    Appendix-A

    Appendix-B

  • 8/10/2019 DISSERTATION_heena.docx

    8/87

    LIST OF TABLES

  • 8/10/2019 DISSERTATION_heena.docx

    9/87

    LIST OF FIGURES

  • 8/10/2019 DISSERTATION_heena.docx

    10/87

    ACRONYMS

    ACK Acknowledgement

    ADC Analog to Digital Convertor

    AI Artificial Intelligence

    AODV Ad-hoc On-demand Distance Vector

    BE Backoff Exponent

    BP Backoff Period

    CRC Cyclic Redundancy Check

    DARPA Defence Advanced Research Project Agency

    DSN Distributed Sensor Networks

    DSSS Direct Sequence Spread Spectrum

    ED Energy Detection

    FC 15 Fedora Core 15

    FTP File Transfer Protocol

    GUI Graphical User Interface I

    IEEE Institute of Electrical and Electronics Engineers

    IP Internet Protocol

    WSN Wireless Sensor Network

  • 8/10/2019 DISSERTATION_heena.docx

    11/87

  • 8/10/2019 DISSERTATION_heena.docx

    12/87

    capabilities, dynamic network topology, limited power, node failures and mobility of nodes,

    short range broadcast communication and multi-hop routing, and large scale of deployment.

    The sensor network architecture consists of one sink node (or base station) and a (large) number

    of sensor nodes deployed over a large geographic area (sensing field). Data are transferred from

    sensor nodes to the sink through a multi-hop communication paradigm [2]. We will consider firstthe case in which both the sink and the sensor nodes are static (static sensor network). Then, we

    will also discuss energy conservation schemes for sensor networks with mobile elements in

    further chapter, in which a sparse sensor network architecture where continuous end-to-endpaths between sensor nodes and the sink might not be availablewill be accounted as well.

    Fig: 2 Sensor network architecture

    The strength of wireless sensor network lies in their flexibility and scalability. The capability of

    self-organize and wireless communication made them to be deployed in an ad-hoc fashion inremote or hazardous location without the need of any existing infrastructure. Through multi-hop

    communication a sensor node can communicate a far away node in the network. This allows the

    addition of sensor nodes in the network to expand the monitored area and hence proves itsscalability and flexibility property.

    The key challenge in sensor networks is to maximize the lifetime of sensor nodes due to the factthat it is not feasible to replace the batteries of thousands of sensor nodes. Therefore,

    computational operations of nodes and communication protocols must be made as energy

    efficient as possible. Among these protocols data transmission protocols have much more

    importance in terms of energy, since the energy required for data transmission takes 70 % of thetotal energy consumption of a wireless sensor network. Area coverage and data aggregation

    techniques can greatly help conserve the scarce energy resources by eliminating data redundancy

    and minimizing the number of data transmissions. Therefore, data aggregation methods in sensornetworks are extensively investigated.

  • 8/10/2019 DISSERTATION_heena.docx

    13/87

    Security in data communication is another important issue to be considered while designing

    wireless sensor networks, as wireless sensor networks may be deployed in hostile areas such as

    battlefields. Therefore, data aggregation protocols should work with the data communicationsecurity protocols, as any conflict between these protocols might create loopholes in network

    security. Presently there are different types of commercially available sensor nodes.

    1.1.1 Sensor network topology

    Sheer numbers of inaccessible and unattended sensor nodes, which are prone to frequent failures.

    Hundreds to several thousands of nodes are deployed throughout the sensor field. They are

    deployed within tens of feet of each other. The node densities may be as high as 20 nodes/ m3.Deploying high number of nodes densely requires careful handling of topology maintenance. We

    examine issues related to topology maintenance and change in three phases:

    1. Pre-deployment and deployment phase: Sensor nodes can be either thrown in mass orplaced one by one in the sensor field. They can be deployed by

    dropping from a plane delivering in an artillery shell, rocket or missile,

    Throwing by a catapult (from a ship board, etc.)

    Placing in factory, and placing one by one either by a human or a robot.

    Although the sheer number of sensors and their unattended deployment usually preclude placingthem according to a carefully engineered deployment plan, the schemes for initial deployment

    must

    reduce the installation cost,

    eliminate the need for any pre-organization and pre-planning,

    increase the flexibility of arrangement, and

    promote self-organization and fault tolerance.

    2. Post-deployment phase: After deployment, topology changes are due tochange in sensor nodes.

    Position

    reach ability (due to jamming, noise, moving obstacles ,etc) available energy

    Malfunctioning and task details.

    Sensor nodes may be statically deployed. However, device failure is a regular or common event

    due to energy depletion or destruction. It is also possible to have sensor networks with highlymobile nodes. Besides, sensor nodes and the network

  • 8/10/2019 DISSERTATION_heena.docx

    14/87

  • 8/10/2019 DISSERTATION_heena.docx

    15/87

    Quality of Service:Some real time sensor application are very time critical which means thedata should be delivered within a certain period of time from the moment it is sensed, otherwise

    the data will be unusable .So this must be a QOS parameter for some applications.

    Unattended operation: In many application sensor networks is deployed once, and after

    deployment have no human intervention. Hence the nodes themselves are responsible forreconfiguration in case of any changes.

    Untethered:The sensor nodes are not connected to any energy source. They have only a finitesource of energy, which must be optimally used for processing and communication. To make

    optimal use of energy, communication should be minimized as much as possible.

    Security:Security is very critical parameter in sensor networks, given some of the proposedapplications. An effective compromise must be obtained, between the low bandwidth

    requirements of sensor network applications and security demands for secure datacommunication in the sensor networks (which traditionally place considerable strain on

    resources)Thus, unlike traditional networks, where the focus is on maximizing channelthroughput with secure transmission.

    1.1.3 APPLICATION REQUIREMENT

    The performance of a secure routing protocol is closely depended on the architectural model and

    design of the sensor networks, base on the application requirements different architectures anddesign goals/constraints have been considered for sensor networks. In this section we attempt to

    capture architectural issues and highlight their implications. The basic configuration of a simple

    sensor node, it depends on the application requirement.

    Security Implementation: Security is data communication is main concerning parameter forproviding secure communication in sensor networks, whiled designing wireless networks, as

    wireless sensor networks may be deployed in hostile areas such as battlefields .therefore, designof protocol should work with the data communication security protocols, as any conflict between

    these protocols might create challenge in network security.

    Energy Considerations: Energy is very important parameter during the creation of an

    infrastructure, and the process of selecting the routes for transmission. Since the transmission

    power of a wireless radio is proportional to distance squared or even higher order in the presenceof obstacles, multi hop routing will consume less energy than direct communication. However,

    multi hop routing introduces significant overhead for topology management and medium access

    control. Direct routing would perform well enough if all the nodes were very close to the sink.

    Data Aggregation/Fusion: In the sensor network, sensor nodes might generate redundant data;

    similar packets from multiple nodes can be aggregated so that the number of transmissions

    would be reduced. Data aggregation is the combination of data from different sources by usingfunctions. Such as suppression (eliminating duplicates), minimum, maximum and average. Some

    of these functions can be performed by the aggregator sensor node, by allowing sensor nodes to

    conduct in-network data reduction. Recognizing that computation would be less energy

  • 8/10/2019 DISSERTATION_heena.docx

    16/87

    consuming than communication, substantial energy savings can be obtained through data

    aggregation.

    Network Dynamics: There are three basic components, sensor nodes, sink and user which ismonitored the events in a sensor network. Most of the network architectures assume that sensor

    nodes are stationary. Some application are required the mobility of sinks or cluster-heads(gateways). Routing messages from or to moving nodes is more challenging since route stability

    becomes an important optimization factor, in addition to energy, bandwidth etc. The sensed

    event can be either dynamic or static depending on the application.

    Node Deployment: It is an important issue to deployment of sensor nodes in topologicalmanner. This is application dependent and affects the performance of the routing protocol. The

    deployment is either deterministic or self-organizing. In deterministic situations, the sensors are

    manually placed or data is routed through pre-determined paths. However in self-organizing

    systems, the sensor nodes are scattered randomly creating an infrastructure in an ad hoc manner.

    Data Delivery Models: Base on the application requirements of the sensor network, the datadelivery model to the sink can be continuous, event-driven, query-driven and hybrid. In the

    continuous delivery model, each sensor sends data periodically. In event-driven and query driven

    models, the transmission of data is triggered when an event occurs or a query is generated by the

    sink. Some networks apply a hybrid model using a combination of continuous, event- driven and

    query-driven data delivery.

    Node Capabilities: Depending on the sort of work a node can be dedicated to a particularspecial function such as relaying, sensing and aggregation since engaging the three

    functionalities at the same time on a node might quickly drain the energy of that node. Inclusion

    of heterogeneous set of sensors raises multiple technical issues making data routing more

    challenging.

    1.1.4 Wireless Sensor Networks vs. Traditional Wireless Networks

    There are many existing protocol, techniques and concepts from traditional wireless network,

    such as cellular network, mobile ad-hoc network, wireless local area network and Bluetooth, are

    applicable and still used in wireless sensor network, but there are also many fundamental

    differences which lead to the need of new protocols and techniques. Some of the most importantcharacteristic differences are summarized below:

    Number of nodes in wireless sensor network is much higher than any traditiona l wireless

    network. Possibly a sensor network has to scale number of nodes to thousands. Moreover a

    sensor network might need to extend the monitored area and has to increase number of nodes

  • 8/10/2019 DISSERTATION_heena.docx

    17/87

    from time to time. This needs a highly scalable solution to ensure sensor network operations

    without any problem.

    Due to large number of sensor nodes, addresses are not assigned to the sensor nodes. Sensor

    networks are not address-centric; instead they are data-centric network. Operations in sensor

    networks are centred on data instead of individual sensor node. As a result sensor nodes require

    collaborative efforts.

    Sensor nodes mainly use a broadcast communication paradigm, whereas most ad hoc networks

    are on point-to-point communications.

    Sensor nodes are much cheaper than nodes in ad hoc networks.

    Wireless sensor networks are environment-driven. While data is generated by humans in

    traditional networks, the sensor network generate data when environment changes. As a result

    the traffic pattern changes dramatically from time to time. Sensor networks are mainly used to

    collect information while MANETs (Mo-bile Ad hoc Networks) are designed for distributed

    computing rather than information gathering.

    A unique characteristic of wireless sensor network is the correlated data problem. Data

    collected by neighbouring sensor nodes are often quite similar which makes possible to the

    development of routing and aggregation techniques that can reduce redundancy and improve

    energy efficiency. It has also been observed that the environmental quantities changes very slow

    and some consecutive readings sense temporally correlated data. This advantageous feature can

    be exploited to develop an energy efficient data gathering and aggregation techniques. Thus,

    unlike traditional networks, where the focus is on maximizing channel throughput or minimizing

    node deployment, the major consideration in a sensor network is to extend the system lifetime as

    well as the system security.

    1.1.5 Applications of Sensors

    Military Applications: Sensor networks are applied very successfully in the military sensing.Now wireless sensor networks can be an integral part of military command, control,

    communications, computing, intelligence, surveillance, reconnaissance and targeting systems.

    There are two example important programs the Distributed Sensor Networks (DSN) and theSensor Information Technology (SenIT) form the Defense Advanced Research Project Agency

    (DARPA) [14], are applied very successfully in the military sensing.

    Environmental Monitoring: Nowadays sensor networks are also widely applied in habitat

    monitoring, agriculture research.

  • 8/10/2019 DISSERTATION_heena.docx

    18/87

    Medical Application: Sensor networks are also widely used in health care area. In somemodern hospital sensor networks are constructed to monitor patient physiological data, to control

    the drug administration track and monitor patients and doctors and inside a hospital.

    Home Application: Many concepts are already designed by researcher and architects, like

    "Smart Environment: Residential Laboratory" and "Smart Kindergarten" some are even realized.

    Traffic Monitoring: The sensor node has a built-in magneto-resistive sensor that measures

    changes in the Earth's magnetic field caused by the presence or passage of a vehicle in the

    proximity of the node. A low-power radio relays the detection data to the access point at user-

    selectable periodic reporting intervals or on an event driven basis. By placing two nodes a few

    feet apart in the direction of traffic, accurate individual vehicle speeds can be measured and

    reported.

    Robotics Control:Robotics has matured as a system integration engineering field defined as

    "the intelligent connection of the perception to action". Programmable robot manipulators

    provide the "action" component. A variety of sensors and sensing techniques are available to

    provide the "perception".

    Habitat Monitoring:The intimate connection with its immediate physical environment allowseach sensor to provide localized measurements and detailed information that is hard to obtain

    through traditional instrumentation.

    1.1.6 Secure Data Routing In Wireless Sensor Network:

    Wireless systems suffer from bandwidth, energy and throughput constraints which bound theamount of information transmission from end-to-end. Data routing is known technique

    considered to alleviate these problems but there is some limitation due to lack of adaption to

    dynamic network topologies and unpredictable traffic patterns.

    The main constrains of WSNs are the power, storage and processing these limitation and the

    specific architecture of sensors nodes call for energy efficient and secure communicationprotocols. The key challenge in WSNs is to maximize the lifetime of sensor nodes because of;

    practically it is not possible to replace the batteries of large number of deployed sensor in the

    environment.

    The main goal of data-routing algorithms is to gather and aggregate data in an energy efficient

    manner so that network lifetime is enhanced. in our framework we have also consider somesecurity issues to establish secured data routing in wireless sensor networks with negligible over

    head. Data routing techniques can significantly help to conserve the limited energy resource by

    eliminating data redundancy and minimizing the number of data transmission.

  • 8/10/2019 DISSERTATION_heena.docx

    19/87

    1.2 Motivation

    Wireless Sensor Networks have risen as an imperative new territory in wireless innovation. The

    wireless sensor networks comprises of many economical nodes each one having the sensing

    proficiency with constrained computational and the correspondence power, which empower us to

    send an extensive scale of sensor network systems.

    Wireless sensor networks are possibly a standout amongst the most important innovations of this

    century. Recent advancement in wireless interchanges and hardware has empowered the

    improvement of ease, low-control, multifunctional little gadgets for utilization in remote sensingprovisions. The combination of these factors has enhanced the reasonability of using a sensor

    system comprising of a substantial number of intelligent sensors, enabling the gathering,

    processing analysis and dissemination of valuable information gathered in a variety of situations.

    A wireless network consists of little devices which screens the physical or environmental

    conditions such as temperature, pressure, movement or pollutants and so on at diverse territories.

    Because of the thorough vitality obligations of extensive number of densely conveyed sensor

    nodes, it requires a suite of system conventions to implement various network control and

    administration capacities, for example, synchronization, hub restriction, and system security.

    A wireless sensor system is an exceptional system with numerous challenges contrasted with a

    traditional computer network. Because of these constraints it is difficult to specifically utilize

    existing security methodologies to the range of WSN. WSNs were at first proposed in spaces

    where standard systems (not so much wired) are not helpful, either on account of the missing

    frameworks, or when various hubs (in the request of hundreds) are required to attain theallocated assignment.

    Four basic components in a sensor network:-

    1. An assembly of distributed or localized errors.

    2. An interconnecting network [usually but not always wireless based].

    3. A central point of information clustering.

    4. A set of computing resources at the central point to handle the data correlation, event

    trending, status querying and data mining.

  • 8/10/2019 DISSERTATION_heena.docx

    20/87

    Fig.3 Sensor Node Component

    Todays sensor can be described as smartinexpensive devices equipped with multiple onboard

    sensing elements; they are low-cost, low power unlettered multifunctional nodes that are

    logically homed to a central sink node.

    Sensor devices or wireless nodes are also sometimes called as motes. In some cases, it is

    challenging to collect[extract] data from wireless sensors because connectivity to and from the

    WSNs may be intermittent due to low-battery status[ e.g, if these are dependent on sunlight torecharge] or other wireless network malfunction.

    Energy efficient wireless communications systems are being sought and are typical of WSNs.

    Low power consumption is a key factor in ensuring long operating horizons for non-power-fed

    systems.

    Power efficiency in WSNs is generally accomplished in three ways:

    Low-dutycycle operation

    Local/in- network processing to reduce data volume Multi hop network reduces the requirement for long-range transmission.

    The typical mode of communication in WSN is from multiple data sources to a data recipient or

    sinks rather than communication between a pair of nodes.

    Location

    Finding

    System

    Mobilizer

    Sensin

    g Unit

    Processing

    Unit

    Transceiv

    er

    POWER UNIT Power

  • 8/10/2019 DISSERTATION_heena.docx

    21/87

    In most scenarios the sensor themselves are not mobile, this implies that the dynamic in the two

    types of networks are different.

    Because the data being collected by multiple sensors are based on common phenomena, there is

    potentially a degree of redundancy in the data being communicated by two various sources in

    wireless sensor networks, such that some typical random-access protocol models may be

    inadequate at the querying-analysis level.

    The main challenges in wireless sensor networks are how to provide maximum lifetime to the

    network and how to provide secure communication to network. As sensor networks totally rely

    on battery power, the main aim for maximizing lifetime of network is to conserve battery power

    or energy with some security considerations.

    In sensor network, energy is mainly consumed for three purposes: data transmission, signal

    processing, and the hardware operation. It is stated in [20] that 70 percent of the energy

    consumption is due to the data transmission. So for maximizing the network lifetime, the process

    of data transmission should be optimized. The data transmission can be optimized by using

    efficient routing protocols and effective ways of data aggregation.

    Routing protocols provide an optimal data transmission route from sensor nodes to sink to save

    energy of nodes in the network. Data aggregation plays an important role in energy conservation

    of sensor network. Data aggregation methods are used not only for finding an optimal path from

    source to destination but also to eliminate the redundancy of data, since transmitting huge

    volume of raw data is an energy intensive operation, and thus minimizing the number of data

    transmission.

    Also multiple sensors may sense the same phenomenon, although from different view and if this

    data can be reconciled into a more meaningful form as it passes through the network, it becomes

    more useful to an application.

    Moreover when data aggregation is performing data is compress as it is passed through the

    network, thus occupying less bandwidth. This also reduces the amount of transmission power

    expended by nodes. Hence secure data aggregation can also be considered as a very challenging

    problem in wireless sensor network.

    1.2.1 Routing in Wireless Sensor Networks

    Routing is a process of determining a path between source and destination upon request of data

    transmission. In WSNs the network layer is mostly used to implement the routing of the

    incoming data. It is known that generally in multi-hop networks the source node cannot reach the

    sink directly. So, intermediate sensor nodes have to relay their packets. The implementation of

  • 8/10/2019 DISSERTATION_heena.docx

    22/87

    routing tables gives the solution. These contain the lists of node option for any given packet

    destination. Routing table is the task of the routing algorithm along with the help of the routing

    protocol for their construction and maintenance.

    1.2.1.1 Routing Challenges and Design Issues

    Depending on the application, different architectures and design goals/constraint have been

    considered for sensor networks. The performance of a routing protocol is closely related to the

    architectural model.

    Network dynamics: Most of the network architectures assume that sensor nodes are

    stationary, because there are very few setups that utilize mobile sensors. It is sometimes

    necessary to support the mobility of sinks or cluster-heads (gateways). Route stability

    becomes an important optimization factor, in addition to energy, bandwidth etc. As,

    routing messages from or to moving nodes is more challenging. So, the sensed event can

    be either dynamic or static depending on the application.

    Node deployment: It is application dependent and affects the performance of the

    routing protocol. The deployment is either deterministic or self-organizing. In

    deterministic situations, the sensors are manually placed and data is routed through pre-

    determined paths. Where as in self-organizing systems, the sensor nodes are scattered

    randomly creating an infrastructure in an ad hoc manner. In later the position of the sink

    or the cluster-head is also crucial in terms of energy efficiency and performance. When

    the distribution of nodes is not uniform, optimal clustering becomes a pressing issue to

    enable energy efficient network operation.

    Energy considerations:During the creation of an infrastructure, the process of setting

    up the routes is greatly influenced by energy considerations. Since the transmission

    power of a wireless radio is proportional to distance squared or even higher order in the

    presence of obstacles, multi-hop routing will consume less energy than direct

    communication. However, multi-hop routing introduces significant overhead for

    topology management and medium access control. Direct routing would perform well

    enough if all the nodes were very close to the sink. Most of the time sensors are scattered

    randomly over an area of interest and multi hop routing becomes unavoidable.

    Data delivery models: Data delivery model to the sink can be continuous, event driven,

    query-driven and hybrid, depending on the application of the sensor network. In the

    continuous delivery model, each sensor sends data periodically. In event-driven and

    query-driven models, the transmission of data is triggered when an event occurs or the

    sink generates a query. Some networks apply a hybrid model using a combination of

  • 8/10/2019 DISSERTATION_heena.docx

    23/87

    continuous, event-driven and query-driven data delivery. The routing protocol is highly

    influenced by the data delivery model, especially with regard to the minimization of

    energy consumption and route stability.

    Node capabilities:In a sensor network, different functionalities can be associated with

    the sensor nodes. Depending on the application a node can be dedicated to a particular

    special function such as relaying, sensing and aggregation since engaging the three

    functionalities at the same time on a node might quickly drain the energy of that node.

    Data aggregation/fusion: Similar packets from multiple nodes can be aggregated to

    reduce the transmission. For this sensor nodes might generate significant redundant data.

    Data aggregation is the combination of data from different sources by using functions

    such as suppression (eliminating duplicates), min, max and average.

    1.2.1.2 Routing Objectives

    Some sensor network applications only require the successful delivery of messages between a

    source and a destination. However, there are applications that need even more assurance. These

    are the real-time requirements of the message delivery, and in parallel, the maximization of

    network lifetime.

    Non-real time delivery: The assurance of message delivery is indispensable for all

    routing protocols. It means that the protocol should always find the route between the

    communicating nodes, if it really exists. This correctness property can be proven in a

    formal way, while the average-case performance can be evaluated by measuring themessage delivery ratio.

    Real-time delivery: Some applications require that a message must be delivered within a

    specified time, otherwise the message becomes useless or its information content is

    decreasing after the time bound. Therefore, the main objective of these protocols is to

    completely control the network delay. The average-case performance of these protocols

    can be evaluated by measuring the message delivery ratio with time constraints.

    Network lifetime: This protocol objective is crucial for those networks, where the

    application must run on sensor nodes as long as possible. The protocols aiming this

    concern try to balance the energy consumption equally among nodes considering their

    residual energy levels. However, the metric used to determine the network lifetime is

    also application dependent. Most protocols assume that every node is equally important

    and they use the time until the first node dies as a metric, or the average energy

    consumption of the nodes as another metric. If nodes are not equally important, then the

    time until the last or high-priority nodes die can be a reasonable metric.

  • 8/10/2019 DISSERTATION_heena.docx

    24/87

    1.2.1.3. Characteristics of Routing Protocols

    Generally the routing protocols are: Application specific, Data Centric, capable of aggregating

    data; Capable of optimizing energy consumption.

    1.2.1.4. Routing Techniques in Wireless Sensor Networks

    WSN Routing Protocols can be classified in four ways, according to the way of routing paths are

    established, according to the network structure, according to the protocol operation and

    according to the initiator of communications. Fig. 4 shows the classification of WSN routing

    protocols.

    Fig. 4 Classification of Routing Protocols in Wireless Sensor Network.

    Routing paths can be established in one of three ways, namely proactive, reactive or hybrid.

    Proactive protocols compute all the routes before they are really needed and then store these

    routes in a routing table in each node. When a route changes, the change has to be propagated

    throughout the network. Since a WSN could consist of thousands of nodes, the routing table that

    each node would have to keep could be huge and therefore proactive protocols are not suited to

    WSNs.

    Reactive protocols compute routes only when they are needed. Hybrid protocols use a

    combination of these two ideas. But in general, routing in WSNs can be divided into three

    categories named as flat-based routing, hierarchical-based routing and location based routing

    depending on the network structure. In flat-based routing, all nodes play the same role. In

    hierarchical-based routing, however, nodes will play different roles in the network. In location-

  • 8/10/2019 DISSERTATION_heena.docx

    25/87

    based routing, sensor nodes' positions are exploited to route data in the network. Furthermore,

    these protocols can be classified into multipath-based, query-based, negotiation-based, QoS-

    based, or coherent-based routing techniques depending on the protocol operation.

    CATEGORY REPRESENTATIVE PROTOCOLS

    LocationbasedProtocols

    MECN, SMECN, GAF, GEAR, SPAN, TBF, BVGF, GeRaF

    Data-Centric Protocols SPIN, Directed Diffusion, Rumor Routing, COUGAR, EAD,ACQUIRE, Information-Directed Routing, Gradient- Based Routing,

    Energy-aware Routing, Information-Directed Routing

    Hierarchial Protocols LEACH,PEGASIS,HEED,TEEN.APTEEN

    Mobility-based

    Protocols

    SEAD,TTDD,Joint Mobility and Routing, Data MULES, Dynamic

    proxy Tree-Base Data Dissemination

    Multipath-basedProtocols

    Sensor-Disjoint Multipath, Braided Multipath

    Hetrogenity-based

    Protocols

    IDSQ,CADR,CHR

    QoS-based protocols SAR, SPEED, Energy Aware Routing

    1.2.2 General Approaches to Data Routing and Energy Conservation

    Depending on the specific applications, the sensor nodes may also include additional

    components such as a location finding system to determine their position, a mobilizer to changetheir location or configuration (e.g., antennas orientation), and so on.

    The power breakdown heavily depends on the specific node. It is shown that the powercharacteristics of a Mote-class node are completely different from those of a Stargate node.

    However, the following remarks generally hold:

    The communication subsystem has much higher energy consumption than thecomputation subsystem. It has been shown that transmitting one bit may consume as

    much as executing a few thousands instructions [21]. Therefore, communication should

    be traded for computation.

    The radio energy consumption is of the same order in the reception, transmission, andidle states, while the power consumption drops of at least one order of magnitude in the

    sleep state. Therefore, the radio should be put to sleep (or turned off) whenever possible.

    Depending on the specific application, the sensing subsystem might be anothersignificant source of energy consumption, so its power consumption has to be reduced aswell.

    Based on the above architecture and power breakdown, several approaches have to be exploited,

    even simultaneously, to reduce power consumption in wireless sensor networks. At a verygeneral level, we identify three main enabling techniques, namely, duty cycling, data-driven

    approaches, and mobility.

  • 8/10/2019 DISSERTATION_heena.docx

    26/87

    Duty cycling is mainly focused on the networking subsystem. The most effective energy-

    conserving operation is putting the radio transceiver in the (low-power) sleep mode whenever

    communication is not required. Ideally, the radio should be switched off as soon as there is nomore data to send/receive, and should be resumed as soon as a new data packet becomes ready.

    In this way nodes alternate between active and sleep periods depending on network activity. This

    behavior is usually referred to as duty cycling, and duty cycle is defined as the fraction of timenodes are active during their lifetime. As sensor nodes perform a cooperative task, they need tocoordinate their sleep/wakeup times.

    A sleep/wakeup scheduling algorithm thus accompanies any duty cycling scheme. It is typically

    a distributed algorithm based on which sensor nodes decide when to transition from active to

    sleep, and back. It allows neighboring nodes to be active at the same time, thus making packet

    exchange feasible even when nodes operate with a low duty cycle (i.e., they sleep for most of thetime).

    Duty-cycling schemes are typically oblivious to data that are sampled by sensor nodes. Hence,

    data-driven approaches can be used to improve the energy efficiency even more. In fact, datasensing impacts on sensor nodes energy consumption in two ways:

    1. Unneeded samples: Sampled data generally has strong spatial and/or temporal correlation

    [22], so there is no need to communicate the redundant information to the sink.

    2. Power consumption of the sensing subsystem: Reducing communication is not enough when

    the sensor itself is power hungry.

    The second issue arises whenever the consumption of the sensing subsystem is not negligible.

    Data driven techniques presented in the following are designed to reduce the amount of sampled

    data by keeping the sensing accuracy within an acceptable level for the application.

    Ordinary nodes wait for the passage of the mobile device and route messages towards it, so thatthe communications take place in proximity (directly or at most with a limited multi-hop

    traversal). As a consequence, ordinary nodes can save energy because path length, contention

    and forwarding overheads are reduced as well. In addition, the mobile device can visit the

    network in order to spread more uniformly the energy consumption due to communications.

    When the cost of mobilizing sensor nodes is prohibitive, the usual approach is to attach sensor

    nodes to entities that will be roaming in the sensing field anyway, such as buses or animals.

    1.2.2.1 In-Network Aggregation

    In-network aggregation deals with this distributed processing of data within the network. In this

    scheme, the sensor networks is divided into pre-defined set of regions .each region is responsiblefor sensing and reporting events that occurs inside the region to the sink node .In a typical sensor

    network scenario, different node collect data from the environment and then send it to some

    central node or sink which analyze and process the data and then send it to the application. But

  • 8/10/2019 DISSERTATION_heena.docx

    27/87

    in-Network data aggregation s, data produced by different node can be jointly processed while

    being forwarded to the sink node.

    "In-network aggregation is the global process of gathering and routing information through a

    multi-hop network, processing data at intermediate nodes with the objective of reducing resource

    consumption (in particular energy), there by increasing network lifetime." In in-networkaggregation, the sensor with the most critical information aggregates the data packets and sends

    the fused data to the sink. Each sensor transmits its signal strength to its neighbours. If the

    neighbour has higher signal strength, the sender stops transmitting packets. After receivingpackets from all the neighbours, the node that has the highest signal strength becomes the data

    aggregator. The in-network aggregation scheme is best suited for environments where events are

    highly localized.

    There are two approaches for in-network aggregation: with size reduction and without size

    reduction. In-network aggregation with size reduction refers to the process of combining and

    compressing the data packets received by a node from its neighbours in order to reduce the

    packet length to be transmitted or forwardedtowards sink. As an example, consider the situationwhen a node receives twopackets which have a spatial correlated data. In this case it is worthless

    to sendboth packets. Instead of that one should apply any function like AVG, MAX,and MINand then send a single packet.

    This approach considerably reduces the amount of bits transmitted in the network and thussaving a lot of energy but on the other hand, it also reduces the precision of value of data

    received. In-network aggregation without size reduction refers to the process merging data

    packets received from different neighbours in to a single data packet but without processing the

    value of data. As an example, two packets may contain different physical quantities (liketemperature and humidity) and they can be merged in to a single packet by keeping both values

    intact but keeping a single header. This approach preserves the value of data and thus transmitmore bits in the network but still reduce the overhead by keeping single header.

    This of the two approaches to use depends on many factors like the type of application, data rate,

    network characteristics and so on. There is also a trade-of between energy consumption andprecision of data for the two approaches.

  • 8/10/2019 DISSERTATION_heena.docx

    28/87

    Fig 5. In-Network Architecture

    An in-network data aggregation scheme, the numbers indicate the signal strengths detected bythe sensors. The arrows indicate the exchange of signal strengths between neighbouring nodes.

    1.2.2.2 Grid-Based Data Aggregation

    Vaidhyanathan et al. [23] have proposed grid base data-aggregation schemes which are based on

    dividing the region monitored by a sensor network into several grids. In grid-based data

    aggregation, a set of sensors is assigned as data aggregators in fixed regions of the sensornetwork. The sensors in a particular grid transmit the data directly to the data aggregator of that

    grid. Hence, the sensors within a grid do not communicate with each other.

    In grid-based data aggregation, the data aggregator is fixed in each grid and it aggregates the datafrom all the sensors within the grid. This is similar to cluster-based data aggregation in which the

    cluster heads are fixed. Grid based data aggregation is suitable for mobile environments such as

    military surveillance and weather forecasting and adapts to dynamic changes in the network andevent mobility. Figure 6 An grid base data aggregation scheme.

    Sink

    In-NetworkAggregator

  • 8/10/2019 DISSERTATION_heena.docx

    29/87

    Fig: 6 Grid base data aggregation

    The arrows indicate the transmission of data from sensors to the grid aggregator.

    A typical Grid-base data aggregation scheme is Fig 6 shows that in grid- based data aggregation;all sensors directly transmit data to a predetermined grid aggregator. After collecting all data

    from other sensors, then aggregator sends only the critical information to the sink nodes. Thusgrid-base scheme reduce the traffic in mobile environment and make sure the critical istransmitted to the sink. However grid-base scheme not perform well where events are highly

    localized and mostly immobile in nature.

    1.2.2.3 Tree-Based Approach

    The simplest way to routing data is to organize the nodes in a hierarchical manner and then select

    some nodes as the aggregation point or aggregators. The tree based approach perform

    aggregation by constructing an aggregation tree, which could be a minimum spanning tree,

    rooted at sink and source nodes are considered as leaves. Each node has a parent node to forward

    its data. Flow of data starts from leaves nodes up to the sink and therein the aggregation done byparent nodes. The way this approach operates has some drawbacks. As we know like any

    wireless network the wireless sensor networks are also not free from failures. In case of packetloss at any level of tree, the data will be lost not only for a single level but for whole related sub-

    tree as well. In spite of high cost for maintaining tree structure in dynamic networks and scarce

    robustness of the system, this approach is very much suitable for designing optimal aggregationtechnique and energy-efficient techniques.

    sink

    GridA re ator

  • 8/10/2019 DISSERTATION_heena.docx

    30/87

    A data-centric protocol which is based on aggregation tress, known as Tiny Aggregation (TAG)

    approach. TAG works in two phases: distribution phase and collection phase. In distribution

    phase, TAG organizes nodes in to a routing tree rooted at sink. The tree formation starts withbroadcasting a message from sink specify level or distance from root. When a node receive this

    message it sets its own level to be the level of message plus one and elect parent as node from

    which it receives the message. After that, node re- broadcast this message with its own level.This process continues until all nodes elect their parent. After tree formation, sink send queriesalong structure to all nodes in the network.

    TAG uses database query language (SQL) for selection and aggregation functions. In collection

    phase, data is forwarded and aggregated from leaves nodes to root. A parent node has to wait for

    data from its entire child node before it can send its aggregate up the tree. Apart from the simple

    aggregation function provided by SQL (eg: COUNT, MIN, MAX, SUM, and AVG), TAG alsopartitions aggregates according to the duplicate sensitivity, exemplary and summary, and

    monotonic properties. Though TAG periodically refresh tree structure of network but as most of

    the tree-based schemes are inefficient for dynamic network.

    A reactive data-centric protocol for applications where sink ask some specific information by

    flooding, known as directed diffusion paradigm. The main idea behind directed diffusionparadigm is to combine data coming from different source and en-route them by eliminating

    redundancy, minimizing the number of data transmission; thus maximizing network lifetime.

    Directed diffusion consists of several elements: interests, data messages, gradients, and

    reinforcements. Figure 7 An tree-base data routing scheme.

    Fig : 7 Tree-base data Routing Architecture

    Fig 7 Simplified schematic for directed diffusion. (a) Interest propagation.

    (b) Initial gradients setup. (c) Data delivery along reinforced path [3].

    The base station (BS) requests data by broadcasting an interest message which contains adescription of a sensing task. This interest message propagates through the network hop-by-hopand each node also broadcast interest message to its neighbour. As interest message propagates

    throughout the network, gradients are set up by every node within the network. The gradient

    direction is set toward the neighbouring node from which the interest is received. This process

  • 8/10/2019 DISSERTATION_heena.docx

    31/87

    continues until gradients are setup from source node to base station. Loops are not checked at

    this stage but removed at later stage. After this path of information flow are formed and then best

    path are reinforced to prevent further flooding according to a local rule.

    Data aggregation took place on the way of different paths from different sources to base station

    or sink. The base station periodically refresh and resend the interest message as soon as it start toreceives data from sources to provide reliability. The problem with directed diffusion is that it

    may not be applied to applications (e.g. environmental monitoring) that require continuous data

    delivery to base station. This is because query driven on demand data model may not help in thisregard. Also matching data to queries might require some extra overhead at the sensor nodes.

    Mobility of sink nodes can also degrade the performance as path from sources to sinks cannot be

    updated until next interest message is flooded throughout the network. To cope up with above

    issue if introduce frequent flooding then also too much overhead of bandwidth and battery powerwill be introduced.

    Furthermore, exploratory data follow all possible paths in the network following gradients which

    lead to unnecessary communications overhead.

    Some assumption have been made, they are:

    (1)All source nodes maintain routes to mobile sink node.(2)No periodically messaging for topological changes due to mobile sink node(3)All links are bi-directional and no control messages are lost.(4)mobile sink nodes have unlimited battery power, so no need to care about battery efficiency

    of sink node(5)Network partitioning is not considered. Data dissemination process

    An energy-aware spanning tree algorithm for data aggregation, referred as E-Span. E-Span is adistributed protocol in which source node that has highest residual energy is chosen as root.Other source nodes choose their parent based on residual energy and distance to the root. The

    protocol uses configuration message to exchange information of node i.e., residual energy and

    distance to the root. Each node performs single-hop broadcast operation to send packets. Single-hop broadcast refers to the operation of sending a packet to all single-hop neighbours.

    Fig: 8 E-Span Protocol Architecture

  • 8/10/2019 DISSERTATION_heena.docx

    32/87

    1.2.2.4 Cluster-Based Approach

    We discussed about hierarchical organization of the network in tree-based approach. Another

    scheme to organize the network in hierarchical manner is cluster-based approach. In cluster-

    based approach, whole network is divided in to several clusters. Each cluster has a cluster-head

    which is selected among cluster members. Cluster-heads do the role of aggregator whichaggregate data received from cluster members locally and then transmit the result to sink. The

    advantages and disadvantages of the cluster-based approaches is very much similar to tree-based

    approaches.

    A maximum lifetime data aggregation (MLDA) algorithm which finds data gathering scheduleprovided location of sensors and base-station, data packet size, and energy of each sensor. A data

    gathering schedule specifies how data packet are collected from sensors and transmitted to base

    station for each round. A schedule can be thought of as a collection of aggregation trees. In, they

    proposed heuristic-greedy clustering-based MLDA based on MLDA algorithm. In this theypartitioned the network in to cluster and referred each cluster as super-sensor. They then

    compute maximum lifetime schedule for the super-sensors and then use this schedule toconstruct aggregation trees for the sensors.

    In present, a two-phase clustering (TPC) scheme. Phase I of this scheme creates clusters with a

    cluster-head and each node within that cluster form a direct link with cluster-head. Phase I of thisscheme is similar to various scheme used for clustering but differ in one way that the cluster-

    head rotation is localized and is done based on the remaining energy level of the sensor nodes

    which minimize time variance of sensors and this lead to energy saving from unnecessary

    cluster-head rotation. In phase II, each node within the cluster searches for a neighbour closerthan cluster-head which is called data relay point and setup up a data relay link. Now the sensor

    nodes within a cluster either use direct link or data relay link to send their data to cluster head

    which is an energy efficient scheme. The data relay point aggregates data at forwarding time toanother data relay point or cluster-head. In case of high network density, TPC phase II will setup

    unnecessary data relay link between neighbours as closely deployed sensor will sense same data

    and this lead to a waste of energy.

  • 8/10/2019 DISSERTATION_heena.docx

    33/87

    Fig: 9 Illustration of twophase clustering

    1.2.3 Clustering in WSN

    It is widely accepted that the energy consumed in one bit of data transfer can be used to perform

    a large number of arithmetic operations in the sensor processor. Moreover in a densely deployed

    sensor network the physical environment would produce very similar data in near-by sensor

    nodes and transmitting such data is more or less redundant.

    Therefore, all these facts encourage using some kind of grouping of nodes such that data from

    sensor nodes of a group can be combined or compressed together in an intelligent way and

    transmit only compact data. This can not only reduce the global data to be transmitted and

    localized most traffic to within each individual group, but reduces the traffic and hence

    contention in a wireless sensor network. This process of grouping of sensor nodes in a denselydeployed large-scale sensor network is known as clustering. The intelligent way to combined and

    compress the data belonging to a single cluster is known as data aggregation.

    There are some issues involved with the process of clustering in a wireless sensor network. First

    issue is, how many clusters should be formed that could optimize some performance parameter.

    Second could be how many nodes should be taken in to a single cluster. Third important issue is

  • 8/10/2019 DISSERTATION_heena.docx

    34/87

    the selection procedure of cluster-head in a cluster. Another issue that has been focused in many

    research papers is to introduce heterogeneity in the network. It means that user can put some

    more powerful nodes, in terms of energy, in the network which can act as a cluster-head and

    other simple node work as cluster-member only. Considering the above issues, many protocols

    have been proposed which deals with each individual issue.

    1.2.4 Obstacles of Sensor Security

    Limited Resources

    > Limited Memory and Storage Space: A sensor is a tiny devicewith only a small amount ofmemory and storage space for the code.

    > Power Limitation: Energy is the biggest constraint to wireless sensor capabilities.

    We assume that once sensor nodes are deployed in a sensor network, they cannot be easilyreplaced (high operating cost) or recharged (high cost of sensors).

    Unreliable Communication: Normally the packet-based routing of the sensor network is

    connectionless and thus inherently unreliable. Packets may get damaged due to channel errors ordropped at highly congested nodes. The result is lost or missing packets.

    1.2.5 Security Requirements

    A sensor network has some exclusive requirements:

    Data Confidentiality: In many applications nodes communicate highly sensitive data,e.g., key distribution; therefore it is extremely important to build a secureCommunication channel in a wireless sensor network [10]. The adversary can change the

    data, so as to send the sensor network into disarray. For example, a malicious node may

    add some fragments or manipulate the data within a packet.

    Data Freshness: Data freshness suggests that the data is recent, and it ensures that no oldmessages have been replayed. This requirement is especially important when there are

    shared-key strategies employed in the design.

    Self-Organization: A wireless sensor network is a typically an ad hoc network, whichrequires every sensor node be independent and flexible enough to be self-organizing and

    self-healing according to different situations.

    Time Synchronization: sensors may wish to compute the end-to end delay of a packet asit travels between two pair wise sensors. A more collaborative sensor network may

    require group synchronization for tracking applications, etc.

    Secure Localization: A sensor network will rely on its ability to accurately andautomatically locate each sensor in the network. A sensor network designed to locate

    faults will need accurate location information in order to pinpoint the location of a fault.

    For large sensor networks, the SPINE (Secure Positioning for sensor Networks)algorithm is used. It is a three phase algorithm based upon verifiable multilateration.

  • 8/10/2019 DISSERTATION_heena.docx

    35/87

    Authentication: Data authentication allows a receiver to verify that the data really issent by the claimed sender. In the case of two-party communication, data authentication

    can be achieved through a purely symmetric mechanism: the sender and the receiver

    share a secret key to compute the message authentication code (MAC) of allcommunicated data.

    1.2.6 Attacks on WSNs

    Denial of Service Attack: "Any event that diminishes or eliminates a network's capacity toperform its expected function".

    Jamming:To jam a node or set of nodes, in this case, is simply the transmission of a radiosignal that interferes with the radio frequencies being used by the sensor network.

    The Sybil Attack: Sybil attack is defined as a "malicious device illegitimately taking onmultiple identities". It was originally described as an attack able to defeat the redundancy

    mechanisms of distributed data storage systems in peer-to-peer networks. In addition to defeatingdistributed data storage systems, the Sybil attack is also effective against routing algorithms, data

    aggregation, voting, fair resource allocation and foiling misbehaviour detection. For instance, ina sensor network voting scheme, the Sybil attack might utilize multiple identities to generate

    additional "votes."

    Node Replication Attacks:An attacker seeks to add a node to an existing sensor network by

    copying (replicating) the node ID of an existing sensor node. A node replicated in this fashioncan severely disrupt a sensor network's performance; packets can be corrupted or even

    misrouted. This can result in a disconnected network, false sensor readings, etc.

    Attacks against Privacy: Monitor and eavesdropping: By listening to the data, the adversarycould easily discover the communication contents. When the traffic conveys the control

    information about the sensor network configuration, which contains potentially more detailed

    information than accessible through the location server, the eavesdropping can act effectivelyagainst the privacy protection.

    State of Art

    In a typical scenario, users can retrieve information of interest from a WSN by injecting queries

    and gathering results from the base stations or sink nodes, which behave as an interface between

    users and the network. In this way, WSNs can be considered as a distributed database. The

    sensor networks will ultimately be connected to the Internet, through which global informationsharing becomes feasible.Sensor device or wireless nodes are also sometimes called as motes. In some cases it is

    challenging to collect [extract] data from WNs because connectivity to and from the WNs may

    be intermittent due to low-battery status [eg., if these are dependent on sunlight to recharge] orother WN malfunction.

  • 8/10/2019 DISSERTATION_heena.docx

    36/87

    The key limitations of wireless sensor networks are the storage, power and processing. These

    limitations and the specific architecture of sensor nodes call for energy efficient and secure

    communication protocols.

    Energy efficient wireless communication systems are being sought and are typical of WSNs.

    Low power computation is a key factor in ensuring long operating horizons for non-power-fedsystems.

    Power efficiency in WSNs is generally accomplished in three ways-

    Low-duty-cycle operation

    Local / in- network processing to reduce data volume

    Multi-hop networking reduces the requirement for long-range transmission.

    The typical mode of communication in wireless sensor network is from multiple data sources to

    a data recipient or sinks rather than communication between a pair of nodes.

    Thesis Outline

    In this thesis we propose an energy-efficient secure routing for wireless networks based on

    symmetric key cryptography. The proposed crypto system is session based and the session key is

    changed after the expire of each session. We divide the network into number of clusters and

    select a cluster head within each cluster. Communication between sensor and the sink takes place

    at the three level; sensor>cluster-head >sink.

    Encryption of the sensed data is transmitted to the cluster head, which aggregated the datareceived from the sensor nodes of its cluster before forwarding to the next cluster head on the

    path or to the sink . Sensors do not participate in the routing scheme; their energy is conserved at

    each sensor node.

    We have organized the thesis into 6 chapters which include Introduction; Background

    Information; Literature Review; Problem Statement and objectives; Requirement analysis/Background of work; Experimental Analysis and Results and finally Conclusion and Future

    Scope.

    Chapter 1 describes Wireless Sensor Network in general in terms of motivation and then

    follows by state of art and finally the whole thesis outline.

    Chapter 2, we discuss the background information relating to WSN and its strength and

    weaknesses. We study the description of protocol modes and working, structure of various

    packets being transferred; procedures followed by the nodes in the particular modes. This chapteroutlines the literature survey. A literature survey condenses, translates, and basically assesses

    existing "literature" (or distributed material) keeping in mind the end goal to make current

    learning of a subject. The reason for doing so identifies with continuous exploration to create that

  • 8/10/2019 DISSERTATION_heena.docx

    37/87

    information: the writing survey may resolve a controversy, make the requirement for extra

    research, and/or characterize a point of inquiry.

    Chapter 3 discusses the problem statement and tasks. This chapter looks into the problem

    statement and objective of thesis. In the chapter we will discuss about background details and

    how I have came to select a particular problem. And, the methodologies used by the researchersare also listed in this chapter with the brief introduction and hardware & software specifications.

    Chapter 4discusses the installation of tools and the simulation environment. In this chapter weinclude the design specification with the methodologies used to perform research work. In this

    part, I clarify the procedure and result approach that have chosen for the focused on issue and

    how it will be determined. Detail explanation of hardware and software platform is also

    mentioned in this chapter.

    Chapter 5 describes the results, evaluates the performance, and analysis. An evaluation of

    selected approach and final result has been discussed in this chapter. The whole process of

    evaluation including its all steps has been described in detail to reach the objective of this study.The select procedure and its after effects and benefits all are explained which will be quite

    efficient for detecting malware. Thus the whole summary of all discussion and its result has beenincluded in this section.

    Chapter 6summarizes the conclusions drawn in the thesis along with future research directions.

  • 8/10/2019 DISSERTATION_heena.docx

    38/87

    CHAPTER 2

    LITERATURE REVIEW

    Wireless Sensor Networks consists of individual nodes that are able to interact with theirenvironment by sensing or controlling physical parameter; these nodes have to collaborate in

    order to fulfil their tasks as usually, a single node is incapable of doing so; and they use wireless

    communication to enable this collaboration [1]. The definition of WSN, according to, Smart Dustprogram of DARPA is:

    A sensor network is a deployment of massive numbers of small, inexpensive, self powereddevices that can sense, compute, and communicate with other devices for the purpose of

    gathering local information to make global decisions about a physical environment [1].

    WSNs are resource limited, they are deployed densely, they are prone to failures, the number of

    nodes in WSNs is several orders higher than that of ad hoc networks, WSN network topology isconstantly changing, WSNs use broadcast communication mediums and finally sensor nodes

    dont have a global identification tags.

    Wireless sensor networks are quite different from general wireless networks due to variousconstraints and highly application specific nature of WSNs. Consequently, WSNs pose different

    research challenges. In wireless communication system, the models for signal strength drop aver

    a distance is well developed.

    The size, power, cost and their tradeoffs are fundamental constraints in WSNs .Considering the

    basic differences with the wireless communication systems, many issues have been identified

    and investigated.

    In this chapter a brief study of different issues and challenges and detection approaches whichhave been explored earlier are presented. At the end of the small survey lots of detection

    techniques and other approaches discussed in various papers will be representing in a tabular

    format. Also solution approaches are depicted in various surveys against few issues and

    challenges that helped in choosing the path of the research and methodology to be used toacquire the desired objective.

    The details of most related paper of our research work are given below.

    Babli Kumari and Jyoti Shukla have proposed a technique Detection Based Path HoppingTechnique to protect the data in WSN that will make data transmission more secure from theattackers.This technique is used to make WSN more secure from intruders and attacks.The

    packet delivery ratio in this technique is more than the original path hopping technique.It secures

    the network more than the existing path hopping technique.

    I.F.Akyildiz, W.Su*, Y.Sankarasubramaniam, E. Cayirci , proposed a survey called WirelessSensor Network :A Survey [2].In this research paper the sensor network applications are

  • 8/10/2019 DISSERTATION_heena.docx

    39/87

    explored, and a review of factors influencing the design of sensor network is provided.

    Realization of sensor networks needs to satisfy the constraints introduced by factors such as fault

    tolerance, scalability, cost, hardware, topology change, environment and power consumption.Theproblems and more development in solutions to the open research issues are described in this

    paper.

    Aashima Singla and Ratika Sachdeva make a review on the Security Issues and Attacks in

    Wireless Sensor Networks. This paper describes the security issues on many attacks that are to

    be protected.As the sensor sensor nodes are highly distributed, there is a need of security in thenetwork. It elaborates the characteristics of WSNs and its types, security issues and various

    attacks on different layers, dimensions of security that are being directed by different physical

    attack.

    Chonggun Kim, Elmurod Talipov and Byoungchul Ahn have proposed a technique A Reverse

    AODV Routing Protocol in Ad Hoc Mobile Network. It describes the successful delivery of

    RREP messages which are important in on-demand routing protocols for ad-hoc networks.R-

    AODV route discovery succeeds in fewer tries and it improves the performance of AODV.

    Jamal N. Al-Karaki and Ahmed E.Kamal had done a survey on Routing Techniques in Wireless

    Sensor Networks. In this survey, they present the state-of-art routing techniques in WSNs. It

    describes the design challenges for routing protocols in WSNs followed by a comprehensivesurvey of different routing techniques, the design tradeoffs between energy and communication

    overheads saving in every routing paradigm. It also highlights the advantages and performance

    issues of each routing technique.

    Chee-Yee Chong, Member, Ieee And Srikanta P. Kumar have find out the opportunities,

    challenges and evolution of sensor networks.This paper traces the history of research in sensornetworks over the past three decades, including two important programs of the DefenseAdvanced Research Projects Agency (DARPA) spanning this period: the Distributed Sensor

    Networks (DSN) and the Sensor Information Technology ( Sens IT) programs. Technology

    trends that impact the development of sensor networks are reviewed, and new applications suchas infrastructure security, habitat monitoring, and traffic control are presented. Technical

    challenges in sensor network development include network discovery, control and routing,

    collaborative signal and information processing, tasking and querying, and security. The paperconcludes by presenting some recent research results in sensor network algorithms, including

    localized algorithms and directed diffusion, distributed tracking in wireless ad hoc networks, and

    distributed classification using local agents.

    Jan Steffan, Ludger Fiege, Mariano Cilia, Alejandro Buchmann introduced the scoping in

    wireless sensor networks. In this paper we proposed that the WSN middleware focuses on very

    high-level system abstractions, such as declarativequery languages, and acts as black box thattries to automaticallymap applications to the underlying resources. We propose scopes as a

    generic abstraction for the definition of groups of nodes. They bridge the gap between high- and

    low-level interfaces and enable the partitioning of WSN functionality. As middleware buildingblock they facilitate the construction of tailored services in multipurpose WSNs.

  • 8/10/2019 DISSERTATION_heena.docx

    40/87

    Shio Kumar Singh, M P Singh , and D K Singh had done a survey on Routing protocols in

    wireless sensor networks. In this paper, we have surveyed a sample of routing protocols by

    taking into account several classification criteria, including location information, networklayering and in-network processing, data centricity, path redundancy, network dynamics, QoS

    requirements, and network heterogeneity. For each of these categories, we have discussed a few

    example protocols. Two important related research directions should receive attention from theresearcher namely the design of routing protocols for duty-cycled WSNs, and three-dimensional(3D) sensor fields when designing such protocols.

    Hiren Kumar Deva Sharma and and Avijit Kar introduced Security Threats in Wireless Sensor

    Networks. In this paper they have studied different key issues in achieving security in WSN. We

    have also studied different threats existing in different layers of the protocol stack of WSN.

    Possible solutions against different threats have also been outlined. T'his work was undertaken

    by the authors and is in progress regarding the design of a security framework for wireless sensor

    networks. The mathematical modeling of different threats present in the WSN is another aspect

    of this work.

    Chris Karlof , David Wagner introduced Secure routing in wireless sensor networks: attacks and

    countermeasures. In this paper the researchers have proposed security goals for routing in sensornetworks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into

    powerful attacks against sensor networks, introduce two classes of novel attacks against sensor

    networkssinkholes and HELLO floods, and analyze the security of all the major sensor

    network routing protocols. We describe crippling attacks against all of them and suggestcountermeasures and design considerations.

    XIAOJIANG DU, HSIAO-HWA CHEN introduced Security in wireless sensor networks. In thisarticle we survey the state of the art in research on sensor network security. In this article, we

    summarize typical attacks on sensor networks and surveyed the literatures on several importantsecurity issues relevant to the sensor networks, including key management, secure timesynchronization, secure location discovery, and secure routing.

    Vinod Kumar Jatav, Meenakshi Tripathi, M S Gaur and Vijay Laxmi introduced the attacks andmodels in wireless sensor networks. This paper presents a mechanism to launch sinkhole attack

    based attacks such as selective forwarding and balckhole attack in wireless sensor networks. The

    proposed work includes detection and countermeasure rules to make the sensor network securefrom these attacks.

    Basil Etefia proposed the Routing Protocol in Wireless Sensor Network, this paper presents animprovement on the implementation of information routing capabilities in ad hoc wireless sensor

    networks. Improving the protocols used by each sensor node can increase the networks

    localization and power conservation abilities.Using a more efficient algorithm will improve the

    overall effectiveness of the entire network in terms of power efficiency.

    YONG WANG, GARHAN ATTEBURY, AND BYRAV RAMAMURTHY have done a surveyof security issues in wireless sensor networks.In this article we present a survey of security issues

    in WSNs. First we outline the constraints, security requirements, and attacks with their

  • 8/10/2019 DISSERTATION_heena.docx

    41/87

    corresponding countermeasures in WSNs. We then present a holistic view of security issues.

    These issues are classified into five categories: cryptography, key management, secure routing,

    secure data aggregation, and intrusion detection.

    Rachid Haboub and Mohammed Ouzzif includes the secure routing in wireless sensor networks.

    In this paper the author has described about the need for security mechanisms aware of thesensor challenges (low energy, computational resources, memory, etc.). Thus, this work aims to

    provide a secure WSN by changing the frequency of data transmission. This security approach

    was tested, and the results shows an interesting decreased of throughput from malicious nodewhen the number of frequency used is increased, that way the WSN will not waste its resources

    treating malicious packets.

    Abolfazl Akbari, Mehdi soruri and Ali Khosrozadeh introduced a technique of A New AODV

    Routing Protocol in Mobile Adhoc Networks. In this paper, they proposed a new route

    maintenance algorithm to avoid route breaks because each intermediate node on an active route

    detects a danger of a link break to an upstream node and reestablishes a new route before a route

    break. We propose this algorithm based on AODV (Ad-hoc On-demand Distance Vector routingprotocol).

    Jinfang Jiang, Guangjie Han, Chuan Zhu, Yuhui Dong, Na Zhang done a survey on Secure

    Localization in Wireless Sensor Networks: A Survey. In this survey, Secure localization of

    unknown nodes in a Wireless Sensor Network (WSN) is an important research subject. WhenWSNs are deployed in hostile environments, many attacks happen, e.g., wormhole, sinkhole and

    sybil attacks. Two issues about unknown nodes secure localization need to be considered. First ,

    the attackers may disguise as or attack the unknown and anchor nodes to interfere with

    localization process. Second, the attackers may forge, modify or replay localization informationto make the estimated positions incorrect. Currently, researchers have proposed many

    techniques, e.g., SeRLoc, HiRLoc and ROPE, to solve the two issues.

    Rijin I.K, Dr.N.K.Sakthivel, Dr.S.Subasree,introduced the Development of an EnhancedEfficient Secured Multi-Hop Routing Technique for Wireless Sensor Networks. An efficient

    secured multi-hop routing technique for wireless sensornetworks (ES-MHRT) was proposedrecently, which was a two contemporary hybrid Multi-Hop Routing Techniques, namely, Flat

    Multi- Hop Routing Technique and Hierarchical Multi-Hop Routing Technique for providing

    trustworthy and efficient routing in WS networks. It demonstrates the effective performance interms of Network Lifetime and superior connectivity. However, from the literature survey, it is

    observed that in ES-MHRT the sender understand the status of delivery report from receiver

    only, which costs more time to understand the reliable route. Thus Sender couldnt forward the

    data in fast manner, which affects the Network Performance in terms of Throughput and Bandwidth Utilization. This is the major issue. To address this issue, this project work is planned

    to design an efficient Distributed Monitoring System, which will help the ES-MHRT to push

    more volume of Data with Secured Route.

    Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos, proposed

    Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In this paper, we presentan Intrusion Detection System designed for wireless sensor networks and show how it can be

  • 8/10/2019 DISSERTATION_heena.docx

    42/87

    configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor

    networks.

    Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou, launched a Sinkhole Attack in

    Wireless Sensor Networks; the Intruder Side. In this paper we investigate in depth one of the

    most severe attacks against sensor networks, namely the sinkhole attack, and we emphasize onstrategies that an attacker can follow to successfully launch such an attack. Then we propose

    specific detection rules that can make legitimate nodes become aware of the threat, while the

    attack is still taking place. Finally, we demonstrate the attack and present some implementationdetails that emphasize the little effort that an attacker would need to put in order to break into a

    realistic sensor network.

    Vinay Soni, Pratik Modi, Vishvash Chaudhri, Detecting Sinkhole Attack in Wireless Sensor

    Network.In this paper the authors proposed that There are many possible attacks on sensor

    network such as selective forwarding, jamming, sinkhole, wormhole, Sybil and hello flood

    attacks. Sinkhole attack is among the most destructive routing attacks for these networks. It may

    cause the intruder to lure all or most of the data flow that has to be captured at the base station.Once sinkhole attack has been implemented and the adversary node has started to work as

    network member in the data routing, it can apply some more threats such as black hole or grayhole. Ultimately this drop of some important data packets can disrupt the sensor networks

    completely. We have presented some countermeasures against the sinkhole attack.

    Shrawan Kumar Trivedi, Rajat Kumar Singh, proposed the Enhancement of energy efficiency in

    heterogeneous wireless sensor network using multi-hop transmission technique. A wireless

    sensor network consists of hundreds of sensor nodes in a wide field. Due to the limited energy

    capability of these sensor nodes, it is known as an energy constrained network and hence thelifetime of this network is limited. So, our primary concern is to save this energy in order to

    increase the lifetime. The efficient way to reach this goal is to use clustering approach. Earlierresearch was done on the homogeneous network model which means all nodes have sameamount of energy. But practically, the network is not a pure homogeneous network, some

    heterogeneity still present on it. In our model, we are using heterogeneous network, and applying

    multi-hop transmission technique instead of direct transmission. The concept of heterogeneity incorrelation with the multi-hop routing technique will enhance the lifetime of the sensor network.

    For validation, we have compared our results with already published results.

    Tejinderdeep Singh, Harpreet Kaur Arora, Detection and Correction of Sinkhole Attack with

    Novel Method in WSN Using NS2 Tool.WSNs suffer from many constraints, including low

    computation capability, small memory, limited energy resources, susceptibility to physical

    capture, and the use of insecure wireless communication channels. These constraints makesecurity in WSNs a challenge. In this article we discuss security issues in WSNs. In this paper

    we are discussing a vulnerable sinkhole attack, its implementation and correction.

    M. Yasir Malik, Draw An Outline of Security in Wireless Sensor Networks: Threats,

    Countermeasures and Implementations. In this chapter, we will provide the basics of

    information security with special emphasis on WSNs. The chapter will also give an overview of

  • 8/10/2019 DISSERTATION_heena.docx

    43/87

    the information security requirements in these networks. Threats to the security of data in WSNs

    and some of their counter measures are also presented.

    Giuseppe Anastasi , Marco Conti, Mario Di Francesco, Andrea Passarella, introduced the Energy

    Conservation in Wireless Sensor Networks: a Survey.The authors present a systematic and

    comprehensive taxonomy of the energy conservation schemes, which are subsequently discussedin depth. Special attention has been devoted to promising solutions which have not yet obtained awide attention in the literature, such as techniques for energy efficient data acquisition. Finally

    we conclude the paper with insights for research directions about energy conservation in WSNs.

    2.1 Review Process Adopted

    Babli Kumari and Jyoti Shukla have proposed a technique Detection Based Path Hopping

    Technique to protect the data in WSN that will make data transmission more secure from the

    attackers. This technique is used to make WSN more secure from intruders and attacks. Thepacket delivery ratio in this technique is more than the original path hopping technique. It

    secures the network more than the existing path hopping technique. In this technique we willimprove the energy efficiency of the sensor network.

    Energy consumption in a sensor node could be due to either useful or wasteful sources.

    Useful energy consumption can be due to transmitting or receiving data, processing queryrequests, and forwarding queries and data to neighboring nodes.

  • 8/10/2019 DISSERTATION_heena.docx

    44/87

    Table 2 . Protocols with their classifications.

    2.2 Categorical Review Secure Routing in Wireless Sensor Network:Energy Efficiency

    Table 3. Attacks , security schemes, and routing protocol used

    Attacks Network

    Architechture

    Layers Security

    Schemes

    Protocols

    Spoofed

    altered,Replayedrouting

    information

    Traditional

    Wireless SensorNetwork

    Physical layer On

    communicationsecurity

    Hierarchical

    Selective

    Forwarding

    Traditional

    Wireless SensorNetwork

    Physical layer Packet Sequence Hierarchical,

    location

    based, network

    flow

    Sinkhole attack Traditional

    wireless

    sensor network

    Physical layer Unique key to

    initialize

    frequency

    Flat based,

    hierarchical,

    network flow

  • 8/10/2019 DISSERTATION_heena.docx

    45/87

    hopping and Qos

    aware

    Sybil attack Traditional

    wireless

    sensor network

    Network Layer Strong

    authentication

    mechanism,

    Radio resource

    Testing, Random

    key

    distributio

    Flat based,

    hierarchical,

    location based

    Wormhole attack Traditional

    wireless

    sensor network

    Network Layer Clock

    Synchronization

    and

    accurate location

    verification

    and TIK

    Flat based,

    hierarchical,

    location based,

    Network flowand Qos

    Aware

    Acknowledgement