SlideShare une entreprise Scribd logo
1  sur  29
Security In Wireless Sensor Network     By      09bce053         AditPathak               09bce057         Mihir  Shah
Presentation  flow What is WSN? Threats to WSN WSN operational paradigms Key distribution techniques for WSN Various key distribution schemes
INTRODUCTION What is a WSN? A wireless sensor network (WSN) consists of spatially distributed autonomous sensor nodes to monitor physical or environmental conditions, such as temprature,sound,vibration,pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. What are they used for? Ocean and wildlife monitoring. Monitoring of manufactured machinery. Building safety. Earthquake monitoring. Variety of military applications. Medical monitoring and research
Threats to a WSN Passive Information Gathering : The powerful receiver          can passively pick off data. Subversion of a node:  Capturing of sensor node  & compromised sensor node False node: Robust device which impersonates a sensor node Node Malfunction:  Generate inaccurate data,drop the data.Detecion of these nodes is an issue. Node outage:  Node stops functioning DoS  (Jamming,BlackHole,Resource Exhaustion)
WSN  OPERATIONAL PARADIGMS Simple  Collection and Transmittal Forwarding Receive and Process Commands Self Organization Data Aggregation
SIMple collection & transmittal Sensor takes periodic measurements & transmit the associated data directly to the collection point. Immediate or scheduled transmission Each node is only concerned with its transmission to base station , which is assumed to be within the range. No routing & co-operation among nodes
Vulnerabilities Jamming Spoofing (Counterfeit  data source broadcasts spurious  information) Loss of confidentiality  due to passive  monitoring Physical attacks(capturing  of a node & subversion)
 Solutions Data encryption(symmetric key) Predeployed keys are shared between & unique to the collection point & individual node. Each node uses its key to encrypt data before transmission & the collection point decrypts the data using the shared key corresponding to that node. Spread spectrum communications may be used to offset efforts to jam the frequency band. Use of temper assistant technologies  which may transmit an alert  and/or self destruct when tempering is detected.
forwarding Allows sensor nodes far away from collection point to transmit data to neighboring nodes , which in turn forward the data toward the collection point. Forwarding process may span multiple sensor nodes on the path between the source & collection point. Solves the radio range problem presented in the Simple Collection and Transmittal paradigm.
Vulnerabilities Single shared key won’t do Black Hole : Sensor node drops packets Data Corruption: Node modifies the data Resource Exhaustion: Attacker maliciously transmits an inordinate amount of data to be forwarded ,causing the intermediate node(s) to exhaust their power supply.
 Solutions System utilizes pre-built headers encrypted under intermediate node’s key. The entire frame is encrypted under senders key and inserted into another frame that is prepended with the pre-built headers and forwards. When intermediate node receives the frame,it strips-off the prepended header and forwards it. At the end it is decrypted by collection point. The algorithm is used to deal with other attacks. The algorithm tracks the absence of expected data from each sensor,quantifies the amount of corrupted data received at the controller from each sensor,and compares those values to acceptable statistical noms. If controller determines a sensor node to be aberrant,it is culled.
Receive and process commands Previous paradigms described many-to-one communication for unsolicited data & may reduce lifetime of WSN due to unnecessary data transmission RPC is one-to-many communication model in which the controller transmits commands to sensor nodes Initially sensor nodes are in idle mode(low power)-controller broadcasts(or unicast)  wakeup  command- getdatacommand-instruct sensor nodes to idle
Vulnerabilities Authentication of command from controller Integrity of the message received from its neighbors
 Solutions Use of shared secrets between the controller and the individual sensor node Distributing encrypted identities of sensor nodes within radio range of controller  among the nodes that are beyond the radio range of controller by using  pre-built headers as was in Forwarding.
SELF ORGANIZATION ,[object Object]
It consists of three tasks:
Node discovery
Route establishment
Topology maintenance.
Node discovery is made by HELLO-REPLY message.
To ensure continuous connectivity, multiple routes between two nodes are discovered.
Here as new nodes are added or older ones exhaust, the topology is re configuared.,[object Object]
Flooding
Sinkhole attacks.SOLUTIONS ,[object Object]
Moreover as a sensor contains cryptographic material, it needs to be configured so that tampering will erase the keys and leave the sensor inoperable.,[object Object]
For controlling data streams, we aggregate data within the WSN and transmitting aggregate to the controller.
This results in a substantial energy savings in the WSN.
The operations can include MAX, MIN, AVG, SUM etc. For example, measuring a temperature.,[object Object]
Here the nodes trust each other. Hence a malicious node can get itself elected as an aggregation point.

Contenu connexe

Tendances

Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
Tarek Gaber
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Piyush Mittal
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
ijujournal
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 

Tendances (20)

Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 

Similaire à Security in wireless sensor network

ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
Elham Hormozi
 
Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based on
Iaetsd Iaetsd
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
Rushin Shah
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
 

Similaire à Security in wireless sensor network (20)

Paper1
Paper1Paper1
Paper1
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
S04404116120
S04404116120S04404116120
S04404116120
 
Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based on
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
The three tier security scheme in wireless
The three tier security scheme in wirelessThe three tier security scheme in wireless
The three tier security scheme in wireless
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in Wsn
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Security in wireless sensor network

  • 1. Security In Wireless Sensor Network By 09bce053 AditPathak 09bce057 Mihir Shah
  • 2. Presentation flow What is WSN? Threats to WSN WSN operational paradigms Key distribution techniques for WSN Various key distribution schemes
  • 3. INTRODUCTION What is a WSN? A wireless sensor network (WSN) consists of spatially distributed autonomous sensor nodes to monitor physical or environmental conditions, such as temprature,sound,vibration,pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. What are they used for? Ocean and wildlife monitoring. Monitoring of manufactured machinery. Building safety. Earthquake monitoring. Variety of military applications. Medical monitoring and research
  • 4. Threats to a WSN Passive Information Gathering : The powerful receiver can passively pick off data. Subversion of a node: Capturing of sensor node & compromised sensor node False node: Robust device which impersonates a sensor node Node Malfunction: Generate inaccurate data,drop the data.Detecion of these nodes is an issue. Node outage: Node stops functioning DoS (Jamming,BlackHole,Resource Exhaustion)
  • 5. WSN OPERATIONAL PARADIGMS Simple Collection and Transmittal Forwarding Receive and Process Commands Self Organization Data Aggregation
  • 6. SIMple collection & transmittal Sensor takes periodic measurements & transmit the associated data directly to the collection point. Immediate or scheduled transmission Each node is only concerned with its transmission to base station , which is assumed to be within the range. No routing & co-operation among nodes
  • 7. Vulnerabilities Jamming Spoofing (Counterfeit data source broadcasts spurious information) Loss of confidentiality due to passive monitoring Physical attacks(capturing of a node & subversion)
  • 8. Solutions Data encryption(symmetric key) Predeployed keys are shared between & unique to the collection point & individual node. Each node uses its key to encrypt data before transmission & the collection point decrypts the data using the shared key corresponding to that node. Spread spectrum communications may be used to offset efforts to jam the frequency band. Use of temper assistant technologies which may transmit an alert and/or self destruct when tempering is detected.
  • 9. forwarding Allows sensor nodes far away from collection point to transmit data to neighboring nodes , which in turn forward the data toward the collection point. Forwarding process may span multiple sensor nodes on the path between the source & collection point. Solves the radio range problem presented in the Simple Collection and Transmittal paradigm.
  • 10. Vulnerabilities Single shared key won’t do Black Hole : Sensor node drops packets Data Corruption: Node modifies the data Resource Exhaustion: Attacker maliciously transmits an inordinate amount of data to be forwarded ,causing the intermediate node(s) to exhaust their power supply.
  • 11. Solutions System utilizes pre-built headers encrypted under intermediate node’s key. The entire frame is encrypted under senders key and inserted into another frame that is prepended with the pre-built headers and forwards. When intermediate node receives the frame,it strips-off the prepended header and forwards it. At the end it is decrypted by collection point. The algorithm is used to deal with other attacks. The algorithm tracks the absence of expected data from each sensor,quantifies the amount of corrupted data received at the controller from each sensor,and compares those values to acceptable statistical noms. If controller determines a sensor node to be aberrant,it is culled.
  • 12. Receive and process commands Previous paradigms described many-to-one communication for unsolicited data & may reduce lifetime of WSN due to unnecessary data transmission RPC is one-to-many communication model in which the controller transmits commands to sensor nodes Initially sensor nodes are in idle mode(low power)-controller broadcasts(or unicast) wakeup command- getdatacommand-instruct sensor nodes to idle
  • 13. Vulnerabilities Authentication of command from controller Integrity of the message received from its neighbors
  • 14. Solutions Use of shared secrets between the controller and the individual sensor node Distributing encrypted identities of sensor nodes within radio range of controller among the nodes that are beyond the radio range of controller by using pre-built headers as was in Forwarding.
  • 15.
  • 16. It consists of three tasks:
  • 20. Node discovery is made by HELLO-REPLY message.
  • 21. To ensure continuous connectivity, multiple routes between two nodes are discovered.
  • 22.
  • 24.
  • 25.
  • 26. For controlling data streams, we aggregate data within the WSN and transmitting aggregate to the controller.
  • 27. This results in a substantial energy savings in the WSN.
  • 28.
  • 29. Here the nodes trust each other. Hence a malicious node can get itself elected as an aggregation point.
  • 30.
  • 31.
  • 32. This combined problem of key distribution and secure communication is called the bootstrapping problem.
  • 33.
  • 34. Deployed nodes must be able to establish secure node to node communication.
  • 35. Additional legitimate nodes deployed at a later time can form secure connections with already deployed nodes.
  • 36. Unauthorized nodes should not be able to gain entry into the network, either through packet injection or masquerading as a legitimate node.
  • 37. The scheme must work through prior knowledge of which nodes will come into communication range of each other.
  • 38.
  • 39. Resilience against node capture:Protection against the capture of node by an adversary.
  • 40. Resistance against node replication:Whether the node can insert hostile nodes into the network after obtaining some secret information.
  • 41. Revocation: Whether a misbehaving node can be dynamically removed from the system.
  • 42.
  • 44.
  • 45.
  • 46. No additional protocol steps are necessary.
  • 47.
  • 48. Nodes are tamper resistant.
  • 49.
  • 50. Prior to deployment, a master public/private keypair is generated. Then for every node keypair is generated. Both keys stored in respective node along with master’s signature on nodes keypair.
  • 51. Nodes can communicate by key exchanges and verification through master’s signature on them.
  • 52.
  • 53. Possible to revoke known compromised keypairs.
  • 54.
  • 56.
  • 57. Hence in a network of n nodes, there are a total nC2 unique keys.
  • 58. Every node stores n-1 keys, one for each other node.
  • 59.
  • 60. Compromised keys can be revoked.
  • 61.
  • 62. Number of keys to be stored in each node is proportional to number of nodes.
  • 63.