You are on page 1of 33

Secure Synchronization with

Trust Evaluation Model (STEM)


for Wireless Sensor Networks

INDEX
Objective
Existing system
Proposed system
Dataflow Diagram
Modules description
Requirements

OBJECTIVE
To obtain healthy packets by Synchronizing
events and increasing the clock precision
with energy saving for addressing the inside
threats.

EXISTING SYSTEM
Secure Synchronization.
High energy consumption.
SOBAS is better only when other similar
schemes do not employ GPS devices.
Clock precision can still be reduced.
No attackers analysis is available.

PROPOSED SYSTEM
Filter the malicious data by using Dynamic En-route
filtering mechanism.
To save energy communication in the network is
minimized.
It provides more clock precision than the existing
system.
Without explicit synchronization control messages it
synchronize the events in the network.
Addresses attackers in the network.

System Architecture
ARC4

Encryption or
Hashing

TKM Module

No-ReEnc

CRYPTO Module

Full- ReEnc

Diffuser

Selective-ReEnc

Full Path
Synchronization

Filtering and
Forwarding
Module
Partial Path
Synchronization
Packets

DATA FLOW
DIAGRAM

Packets
Time based key
management
module
Crypto
module
Malicious node
analysis

Filter data

Forward data
Loose
synchronization

No reEnc

Selective reEnc

Analysis of outsider
attackers
Addressing inside
threats
Healthy Packets

Full reEnc

MODULES
Time Based Key Management (TKM)
Module.
CRYPTO Module.
Filtering And Forwarding Synchronization
(FFS) Module.
Selective Re-Encryption Module.
Analysis of Attackers.

TIME BASE KEY MANAGEMENT MODULE


Keys are generated dynamically using local time(local
clock value).
Keys are a function of the current local time value (tl)
and either an Initialization vector(IV) or previous
key(Kj-1).
K1t=F(tl ,IV)
The operations encryption or hashing ,diffusion and
left circular shift are performed.

TIME BASED KEY MANAGEMENT MODULE


Packets
Key generation
K1t =F(tl,IV)

Encryption , Diffusion and shift

Stateful mode

Dynamic key

CRYPTO MODULE
Security part of STEM

which uses ARC4

algorithm.
Keys from TKM module is verified here and sent
back to TKM if the key received is wrong.
3 Operational Modes used in the algorithm.
No reEnc
Full reEnc
Selective reEnc

CRYPTO MODULE
TKM Module

Dynamic Key

Verify

RC4 Algorithm
Operational Modes
Packets with Key

Wrong key

FILTERING AND FORWARDING


SYNCHRONIZATION MODULE

It filters the incoming packets, removes the bad


packet from the network.
The

forwarder

node,

first

synchronize

themselves and then forward the report.


The advantage is only one value is tracked.
It can properly order any report from any
source in the network using values.

Selective Re-Encryption Module


Re-encryption at different hops along the data
delivery path to the sink.
Transmission costs and total energy consumption
are identified.
Third, Fifth and seventh nodes are re-encrypted.

Analysis of Attackers.
The outside malicious node will be able to
inject a false packet.
Classified based on the eavesdropping of
messages
Classified attackers are
1.Sensor-class attackers
2.Middle-class attackers
3.Powerful attackers

System Requirements
Language : JAVA
Tool
: NET BEANS IDE
Database : MY SQL
Hardware : Pentium iv 2.4 GHz,
200 GB Hard disk,
1 GB RAM ,
1.44 MB floppy drive,
Monitor ,mouse

Conclusion
We relaxed the perfect synchronization
condition for WSN.
We
focused
on
minimizing
the
communication in the network.
We have been able to achieve our main goal
of synchronizing events at a sink as quickly,
accurately and surreptitiously as possible.

Future Enhancement
Studying further more opportunities for
increasing the clock precision.
Key trials usage can further be reduced.

References
S.R. Fluhrer, I. Mantin, and A. Shamir, Weaknesses
in the Key Scheduling Algorithm of RC4 Proc.
Revised Papers from the Eighth Ann. Intl Workshop
Selected Areas in Cryptography (SAC),pp. 1-24,2001.
A. Uluagac, R. Beyah, Y. Li, and J. Copeland, Vebek:
Virtual Energy-Based Encryption and Keying for
Wireless Sensor Net-worksIEEE Trans. Mobile
Computing,vol. 9, no. 7, pp. 994-1007,July 2010.
A.S. Uluagac, R.A. Beyah, and J.A. Copeland, TImeBased Dynamic Keying and En-Route Filtering
(TICK) for Wireless Sensor Networks Proc. IEEE
Global Comm. Conf. (Globecom),2010.

Sink and Nodes Generation

Node Selection

Path Selection

Key Generation

Encryption

Crypto Module- correct key

Crypto Module-wrong key

Incoming Packet Reporting

Incoming Packet to SINK

Source and Nodes Identification

Path of Packet Delivery

TICK Window

Graph OUTPUT

You might also like