Open Access Open Access  Restricted Access Subscription or Fee Access

Network Security Management in Wireless Networks through 3-Round Zero Knowledge Proof

K. Vamsiram, I. Bala Venkateswarlu

Abstract


Wireless Sensor Networks (WSNs) will provide an excellent opportunity to control environments. Even WSNs have lot of applications, some of them quite sensitive in nature and require full proof secured environment. The wireless security mechanism is not same as in wired networks. Because there is no user-controlling for each individual node, wireless environment, and more importantly, scarce energy resources. In this paper, we propose the 3-round zero knowledge protocol for main problem in sensor network security is that sensors are compromised once; the adversary can easily launch clone attacks by replicating the compromised node, distributing the clones throughout the network, and starting a variety of insider attacks. Previous works against clone attacks suffer from either a high communication/storage overhead or poor detection accuracy. Here, we propose a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighbourhood characteristics and verifies the legitimacy of the originator for each message by checking the enclosed fingerprint. The fingerprint generation is based on the superimposed s-disjunct code, which incurs a very light communication and computation overhead. The fingerprint verification is conducted at both the base station and the neighbouring sensors, which ensures a high detection probability. The security and performance analysis indicate that our algorithm can identify clone attacks with a high detection probability at the cost of a low computation/communication/storage overhead. To our best knowledge, our scheme is the first to provide real-time detection of clone attacks in an effective and efficient way.

Keywords


Clone Attack, Man in Middle Attack, Replay Attack, 3-Round Zero Knowledge Protocol, WSN

Full Text:

PDF

References


Mauro Conti, Luigi Vincenzo Mancini, and Alessandro Mei, “Distributed in Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing., vol. 8, no. 5,September/October 2011

L.Eschenauer and V.D.Gligor, “A Key Mauro Conti, Luigi Vincenzo Mancini, and Alessandro Mei, “Distributed Detection of Clone Attacks in Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing., vol. 8, no. L.Eschenauer and V.D.Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. mputer and Comm. Security (CCS ’02), pp. 41-47, 2002. Conf. Computer and Comm. Security (CCS ’02), pp. 41

R. Brooks, P. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M.T. Kandemir, “On the Detection of R. Brooks, P. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M.T. Kandemir, “On the Detection of Clones in

Sensor Networks Using Random Key Predistribution,” IEEE Trans. Systems, Man and Clones in Sensor Networks Using Random Key Predistribution,” IEEE Trans. Systems, Man and Cybernetics, Part C: Applications and Rev., vol. 37, no. 6, pp. 1246 cs, Part C: Applications and Rev., vol. 37, no. 6, pp. 1246-1258, Nov. 2007.

C. Bekara, M. Laurent-Maknavicius. “A new protocol for securing wireless sensor networks against Maknavicius. “A new protocol for securing wireless sensor networks againstnodes replication attacks”, In Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2007. nodes replication attacks”, In Proceedings of the 3rd IEEE International Con Mobile Computing, Networking and Communications (WiMob), 2007.

B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in SensorNetworks,” Proc. IEEE Symposium. Security and Privacy, pp. 49-63, May 2005. Networks,” Proc. IEEE Symposium. Security and Privacy, pp. 49

Detection of Clone Attacksin Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing., vol. 8, no. Management Scheme for Distributed Sensor Networks,” Proc.

R. Brooks, P. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M.T. Kandemir, “On the Detection ofClones in Sensor Networks Using Random Key Predistribution,” IEEE Trans. Systems, Man and Maknavicius. “A new protocol for securing wireless sensor networks againstference on Wireless and

Kai Xing Fang, Liu Xiuzhen, Cheng David, H. C. Du, Real-Time Detection of Clone Attacks in Wireless Sensor Networks Proceedings of the 28th International Conference on DistributedComputing Systems, 2008, Pages 3-10.

Joseph Binder, Hans Peter Bischof, Zero Knowledge Proofs of Identityfor Ad Hoc Wireless Networks An In-Depth Study,Technical Report, 2003. http://www.cs.rit.edu/ jsb7384/zkpsurvey.pdf

Klempous R.; Nikodem J.; Radosz, L.; Raus, N. ByzantineAlgorithms in Wireless Sensors Network, Wroclaw Univ. ofTechnol.,Wroclaw; Information and Automation, 2006. ICIA2006.International Conference on, 15-17 Dec. 2006, pages :319-324

A. J. Macula. A simple construction of d-disjunct matrices withcertain constant weights Discrete Math., 162(13):311-312, 1996

K. Xing, X. Cheng, L. Ma, and Q. Liang.,Superimposed Code Based Channel Assignment in Multi-radio Multi-channel Wireless Mesh Networks. In MobiCom’07, pages 15-26, 2007.

Md. Moniruzzaman, Md. Junaid ,Arafeen, Saugata Bose, Overviewof Wireless Sensor Networks: Detection of Cloned NodeUsing RM,LSN SET, Bloom filter and AICN Protocol and

Comparing H.Choi, S.Zhu, and T.Laporta.,Set: Detecting Node Clones in Sensor Networks. InSecureComm’07, 2007.

Goldreich, O., Micali, S., and Wigderson, Proofs That Yield Nothing But Their Validity Or All Languages in NP Have Zeroknowledge Proof Systems, Journal of the ACM, Vol. 38, No. 1,pp.691-729, 1991.

Tuyls, Pim T. (Mol, BE), Murray, Bruce (Eastleigh GB),Efficient Implementation of Zero Knowledge Protocols,United States NXP

B.V.(Eindhoven,NL)7555646,June2009,http://www.freepatentsonlin e.com/7555646.html.

Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Commun. SurveysTutorials, vol. 8, pp. 2–23, year 2006. (IJCSIS) International Journal of Computer Science and Information Security,Vol. 4, No. 1 & 2, 2009.

Siba K. Udgata, Alefiah Mubeen, Samrat L.Sabat Wireless sensor security model using zero knowledge protocol, 978-1-61284-233-2/11/$26.00 ©2011 IEEE.

A. G. Dyachkov and V. V. Rykov., Optimal superimposed codes and designs for Renyis Search Model. Journal of Statistical


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.