Energy Efficient Secure Scheme for Wireless Sensor Networks

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 04 | Apr -2017

p-ISSN: 2395-0072

www.irjet.net

Energy Efficient Secure Scheme for Wireless Sensor Networks Abhilasha K M, Shwetha V, Ashritha Kumari K S, Sindhu T R, Rekha K S Dept. of Computer Science and Engineering, The National Institute of Engineering, Mysuru Karnataka, India ---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - The major issues in Wireless Sensor network

design are security and energy efficiency. This paper aims to develop an energy-efficient secure scheme against power exhausting attacks, especially denial-of-sleep attack, due to this denial of sleep attack WSNs lifetime will be shortened. Several MAC protocols have been proposed to save power and extend the lifetime of WSNs but these protocols are insufficient to protect nodes from denial of sleep attack. The existing known security mechanism awakes the sensor nodes before it undergoes security processes which take long duration to authenticate which is vulnerable to denial of sleep attacks. Therefore this design is concerned on simplifying the authentication process to reduce energy consumption of sensor nodes and increases the performance and also it eliminates forge attacks and replay attacks.

Key Words: wireless sensor network, energy efficiency, denial-of-sleep, power exhausting attacks, secure scheme.

1. INTRODUCTION A wireless sensor networks mainly consists of base station and sensor nodes. The base station sends a broad cast message to all sensor nodes to form a cluster and select the head node. The other sensor nodes in a cluster do not directly interact with the base station. The interaction between the sensor nodes and base station is via head node. This is shown in the fig-1. It helps in best utilization of battery. If each sensor nodes send data to base station it consume all sensor node battery instead the sensor nodes sends a data to near head node and the head forward the data of all sensor nodes in the cluster along with its own data to base station.

Fig-1 wireless sensor networks

efficient for WSNs design [1-4]. WSNs are vulnerable to malicious attack whose target is sensor node power supply which results in denial of sleep attack. This type of attack reduces sensor life time from years to days [5]. X-MAC protocol is a low power protocol for a WSNs. X-MAC approach is simple and asynchronous. It has long preamble which results in excess latency at each hop and also suffers from excess energy consumption at non target receivers [6]. In ordered to reduce the inefficiency of X-MAC and also B-MAC we are using RI-MAC protocol. RI-MAC is a receiver initiated protocol in this first the receiver sends beacon message to the sender to inform that it is ready to receive the data then if sender has any data to send it sends the acknowledgement, after that it sends data to the receiver. Otherwise it does not send the acknowledgement [7].

2. LITERATURE SURVEY In [6], M. Buettner, G.V Yee, E. Anderson, and R.Han. This paper presents X-MAC, a low power MAC protocol for Wireless sensors networks (WSNs). Standard MAC which is default MAC protocol for tiny operating system employ an extended preamble. Long preamble introduces excess latency and results in low power communication. X-MAC developed shortened preamble to minimize low power communication. These existing designs of MAC protocol are insufficient. The issues of this protocol can be overcome by using RI-MAC protocol which is a receiver initiated protocol and it will be used in our project. In [5], D. R. Raymond, R.C. Marchany, M.I. BrownďŹ eld, and S. F. Midkiff. This paper presents in Wireless Sensor Networks the major issue found is Denial-of-Sleep attacks. In this paper they have used several MAC layers protocols for authenticating process. In present system when the sensor nodes sense the data, they encrypt their data and send it to the head node. To check the whether the node is authorized or not the head node had to decrypt that message and see it is from authorized node or not. This process takes long duration and consumes a head node battery life. To overcome this in our paper we simplified the authentication process by adding MAC code. The sensor nodes send an encrypted message to the head along with MAC code. To check the node is authorized or not head node verifies the MAC code and no need to decrypt the message. This saves the battery life of head node.

In the above fig-1 the security and energy efficiency are the critical concerns. Various MAC protocols have been proposed to overcome this problem but these are not Š 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

|

Page 1323


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.