Documente Academic
Documente Profesional
Documente Cultură
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
Abstract— Wireless Sensor Networks (WSNs) can be defined measurement of physical parameters such as temperature,
as a self-configured and infrastructure-less wireless networks pressure, or relative humidity.
to monitor physical or environmental conditions, such as These nodes by monitoring, collect detailed information
temperature, sound, vibration, pressure, and motion. A about the physical environment in which they are installed,
Wireless Sensor Network (WSN) contains a large number of and then transmit the collected data to the Base Station (BS).
sensor nodes. The sensor nodes can communicate among BS is a gateway from sensor networks to the outside world.
themselves using radio signals. A wireless sensor node is
equipped with sensing and computing devices, radio
transceivers and power components. The sensor nodes
depend upon battery power. Sensor nodes utilize more
energy compared to a normal node.
Typically in WSN, sensor nodes are attached to one or more
base stations. As Wireless sensor networks continues to grow,
they become vulnerable to attacks and hence they need for
effective security mechanisms, The Sybil attack is one of the
dangerous attacks against sensor and ad-hoc networks,
where a node illegitimately claims multiple identities.
Identification of suitable cryptography for wireless sensor
networks is an important challenge due to limitation of
energy, computation capability and storage resources of the
sensor nodes. Symmetric based cryptographic schemes do
not scale well when the number of sensor nodes increases.
Hence public key based schemes are widely used.
To keep away from various vulnerable attacks, we propose a
novel encryption schema based on Elliptic Curve
Cryptography (ECC) and homomorphic encryption to secure Fig.1 Wireless Sensor Networks [5]
data transmission in WSN , The proposed encryption schema
takes less memory, reduces the computation time, provides The BS has a very large storage and large data processing
great security and flawlessly suitable for low power devices capabilities. It passes the data it receives from sensor nodes
like mobile nodes. The aim of this work is to provide security to the server from where end-user can access them.
to the wireless sensor network using elliptical curves Security in WSN is a greater challenge due to the processing
cryptography along with genetic algorithm. limitations of sensor nodes and nature of wireless links.
Extensive use of WSNs is giving rise to different types of
Keywords— Wireless Sensor Networks, Sybil attacks, Genetic threats. To defend against the threats proper security schemes
Algorithm, Leach-e, Leach-e-ga, Cluster head, Base Station, are required. Traditionally security is implemented through
Elliptic Curve Cryptography. hardware or software and is generally achieved through
cryptographic methods. Limited area, nature of links, limited
processing, power and memory of WSNs leads to strict
I. INTRODUCTION constraints on the selection of cryptographic techniques.
In this paper, we propose a novel encryption schema based
A wireless Sensor Network (WSN) is a distributed on Elliptic Curve Cryptography (ECC) and homomorphic
network of small sensor nodes deployed in large numbers encryption to secure data transmission in WSN. The
to monitor the environment or other systems by the proposed encryption schema is built upon GASONeC
algorithm (Elhoseny et al., 2014) that uses genetic algorithm
www.ijcsit.com 517
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
www.ijcsit.com 518
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
www.ijcsit.com 519
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
www.ijcsit.com 520
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
A- Sybil Attack Sybil attack on routing can also results multipath or disparity
routing in, seemingly disjoint paths can go through a single
Sybil node is the process of creating two or more duplicate malicious node presenting identities. Data Aggregation Sybil
nodes with similar identity i.e. same node id as shown in attack affect on some sensor network protocols to aggregate
Figure 2. the reading of sensors in order to conserve energy rather than
Particularly, wireless sensor networks are more prone to returning individual readings. Fair Resource Allocation Sybil
Sybil attack because of the open and broadcast attack can be used in fair resource allocation which will allow
communication medium and the same frequency is being a malicious node to obtain unfair share of resources. In
shared among all nodes. In Sybil attack, attacker makes Misbehaviour Detection nodes can be used to spread the
multiple illegitimate identities in sensor networks either by blame in a misbehaviour detection network.
fabricating or stealing the identities of legitimate nodes.
So the base station cannot distinguish the legitimate and B. Existing Detection Methods
the forged node. This confuses the base station and other
nodes and the network performance degrades. It is very A. Radio Resource Testing This method is based on the radio
important to know about the different forms of capability of each node of the network which already have
Sybil attack, which have targeted the network to get got assigned a single radio randomly to broadcast and listen.
confused or damaged. Sybil attack Taxonomy is three Let’s assume that in network any physical device has only
dimensional taxonomy: one radio and radio is incapable of simultaneously sending or
1. Direct vs. Indirect Communications receiving on more than one channel. Now every node is
2. Fabricated vs. Stolen Identities. assigned a different channel to broadcast and different
3. Simultaneity. channel to listen. If the neighbour with assigned channel is
In direct method of Sybil attack, legitimate nodes legitimate then:
communicates directly with nodes however in case of let s is the total number of nodes and n is number of nodes
indirect method, communication in between legitimate then:
node and nodes is done via malicious nodes. Sybil attack Prob. of detection = s/n
may also include fabricated and stolen identities. Prob. Of non-detection = (n-s)/n
For r rounds: Prob. of non-detection = ((n-s)/n)r
In case of fabricated identity, nodes create similar In case there are no enough channels for assignment to the
fabricated ID for it on the basis of structure of legitimate nodes then this method can face problem.
nodes ID. nodes may also steal the legitimate nodes ID
and can use it as its own ID. B. Registration Registration may be one of the effective
Such attacking nodes will not be identified till stolen ID is solutions to prevent from Sybil attack. There may be one
destroyed. If the Sybil attack is simultaneous, all identities trusted central authority to know the nodes identity. This can
will participate in network at same time. In non help in identifying the legitimate node as it to be checked in
simultaneous Sybil attack, attacker presents a large known good list. But registration list which contains known
number of identities over a period of time. identities has to be protected from malicious nodes. If any
attacker could add its identity in this list then identity will be
treated as known-good.
www.ijcsit.com 521
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
www.ijcsit.com 522
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
www.ijcsit.com 523
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
D. System Overview
LEACH-E protocol improves the CH selection procedure. Sensor ・ Initialize population and Objective Function Value- [OFV].
node’s residual energy is the main concern, which decides ・ Define the Fitness function.
whether the node become a CH or not after the first round ・ Selection.
(BaniYassein .M et al2009). Like LEACH protocol, LEACH-E is ・ Cross over.
divided into rounds (Shankar .M et al. 2012). In the first round, ・ Mutation.
all the nodes have the same probability of being a CH. At the end ・ Repeat the above steps until reaching the solution.
of the first round, the node, which has more residual energy, is
elected as CH. LEACH–E protocol improves the cluster head A population contains a group of individuals named chromosomes,
selection procedure. which represents a finished solution for a derived problem. Each
chromosome is a sequence of values of the attribute [node-energy,
2. Leach-E-GA (Leach-Energy-Genetic Algorithm) node-trust value, and node-distance]. [17]
Fig. 4 GA Flowchart used for WSN [17]
www.ijcsit.com 524
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
Fig.5 Mutation [22]
3. ECC Cryptography
Elliptic Curve Cryptography was first projected by victor Miller
and independently by Neal Koblitz in the mid-1980s and has
evolved into a mature public-key cryptosystem. Compared to its
traditional counterparts, ECC offers the equal level of security
using much smaller keys. This result in faster computations and
reserves in memory, power and bandwidth those are especially
important in constrained environments. More significantly, the
advantage of ECC over its competitor’s increases, as the security
needs increase in excess of time. ECC operates over a group of
points on an elliptic curve defined over a finite field.
www.ijcsit.com 525
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
The project has gone through the following phases: Consider the points,
1. Deployment of the Sensor Nodes: In this, we have created 1).The point (x=1, y=5) in E (F29) satisfies the equation elliptic
the wireless sensor nodes which are randomly generated. curve as:
2. Topology Formation: These nodes are scattered randomly y2 mod p = x3 + 4x + 20 mod p
and have formed the structure, we can call it as topology. 25 mod 29 = 1 + 4 + 20 mod 29
3. Clustering: After deployment of random nodes, we have 25 = 25 this satisfies the equation of EC.
created clusters of the nodes.
We use LEACH-E Genetic algorithm (GA) for our network 2) The point (x=3, y=1) in E (F29) satisfies the equation elliptic
architecture to provide the security to the network as it is used to curve as:
identify the node best trusted neighbours for communication y2 mod p = x3 + 4x + 20 mod p
using its optimization capability which would enhance the WSN 1 mod 29 = 27 + 12+ 20 mod 29
response time, network life and minimize the delay. The Genetic 1 = 1 this satisfies the equation of EC.
algorithm improves the cluster heads selection process. Selecting
the minimum number of cluster heads in the WSN is determined 3) The point (x=15, y=2) in E (F29) satisfies the equation elliptic
based on the square root of the total number of sensor nodes, to curve as:
minimize the total energy consumption. y2 mod p = x3 + 4x + 20 mod p
4. Security Implementation: For security implementation in the 4 mod 29 = 3375 + 60+ 20 mod 29
network, we have used elliptical curve cryptography to encrypt 4=4, this satisfies the equation of EC. [11]
the messages sent from the sender to the receiver side. After
deployment and clustering of the wireless sensor network, we
have implemented the security among the each node to be i. Numerical Illustration
communicated. Each sensor node will have routing table. Each
sensor node is having their id and some relevant information like
Population of Nodes
their public key which has been used in the process of encrypting
the data or message to be transmitted. All nodes in the network are considered as chromosomes. The CH
The private keys are randomly generated which are used to and CM nodes are represented as X and Y respectively. The fitness
decrypt the message at the receiver side. of a chromosome is evaluated by many parameters, such as node
Consider the standard elliptic curve equation as, energy, distance, node trust value. Population P consists of several
(E.q. 1) chromosomes. For example, the population P is initialized as P =50
and it is generated randomly. According to the fitness the population
transforms into the future generation.
Ex:
E = y^2 = x^3 + 4x + 20, defined over F29 with the constants Fitness Parameters
where, a = 4 and b = 20 which have been checked to satisfy that
E is an elliptic curve.
Fig. 7 Elliptic Curve Point Representation [11] ...... (E.q. 1)
www.ijcsit.com 526
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
Where all the attributes are used as notation in the above ii. Mathematical Model
objective constrains to represent the fitness function and it is
described in the following table-3. If the node satisfied in terms A mathematical model is an abstract model that uses mathematical
of OBF, then there will be a link provides between X, Y, where language to describe the behaviour of the system. Set theory and
X represents the node and the Y represents the cluster. Each mathematical model for A Mechanism of Preventing Sybil Attack in
chromosome is evaluated according to the fitting parameters and WSN by Using Elliptic Curve Cryptography with Genetic
update in each round, and it can be written as: Algorithm is described.
Table 3. Nomenclature [17] 11. Let SD be the set of cluster distance with deviation.
Fecc encrypt =
Where, Cm is cipher text message.
Pm is plain text or original message.
x is random integer selected by the sender of the message, A sender.
G is a point of a,b.
PB is B’s public key.
www.ijcsit.com 527
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
Then Leach-e-ga algorithm is implemented, we have selected the Then the Elliptic curve cryptography is implemented to secure data
Base Station, Cluster heads and the normal nodes of each cluster. transmission between the sensor nodes and to provide more security
The base station or sink node (BS) is shown by red colour and 13 to the network.
cluster heads are shown by blue colour and remaining nodes for
the respective nodes are acting as cluster members for their
respective cluster heads. During the simulation Sybil Attack
nodes will be detected and removed from the network by using
Leach-e-ga algorithm. And this will provide the required security
to the network.
www.ijcsit.com 530
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
www.ijcsit.com 531
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
Fig. 18 Throughput Vs Interval Fig. 20 Number of nodes Vs Security ratio using RSA and
ECC
www.ijcsit.com 532
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
ACKNOWLEDGMENT
EXPECTED OUTCOME
Foremost, I would like to express my sincere gratitude to lecturer
J.E. Kamalasekaran for the continuous support during my work, for
Random Password Comparison [RPC] technique is added to her motivation, enthusiasm, and immense knowledge. Her guidance
leach-e-GA to provide more accuracy and thereby improve data helped me in all the time of research and writing of this research.
transmission in the network also it will increase the throughput. I would like to thank the Department of Computer Engineering
RPC algorithm discovers a valid route in the sensor network by SCOE, especially the management Prof. M. P. Wankhade, Head of
checking each node is a trustable node or a Sybil node so that the Computer Engineering Department and those members of Seminar
data can be transmitted very safely. The Sybil nodes are detected Review committee for their input, valuable discussions and
and data leakage is avoided completely by using RPC. As the accessibility. In particular, I would like to thank Prof. M. P.
Sybil nodes are detected in the discovery stage of finding initial Wankhadeand Prof. D.D. Gatade for their support, expertise and
route, they enable continuation of further transmission without patience, Prof. G.T.Chavan, ME Coordinator he has been always
any fear of attack. there for guidance and give advice. I am deeply grateful to him for
his continuous encouragement and guidance. I thank all my fellow
lab mates and my friends in the college.
V. CONCLUSION Last but not the least; I would like to thank my family: my parents,
In wireless sensor networks, the energy limitations of nodes my wife for supporting, encouraging me spiritually throughout my
play a crucial role in designing any protocol for implementation. life.
The wireless sensor networks continue to grow and become
widely used in many applications. So, the need for security
becomes vital. However, the wireless sensor network suffers
from many constraints such as limited energy, processing
capability, and storage capacity, etc. There are many ways to
provide security, one is cryptography.
In this work, it is aimed to select nodes for clustering using
LEACH-E-GA in order to improve the energy efficiency with
trusted nodes. Before, clustering all the nodes are optimized by
the Genetic Algorithm and LEACH-E do clustering and CH
election. The nodes are optimized using their attributes such as
energy value, distance, and trust value.
www.ijcsit.com 533
Omar Badeea Baban / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 8 (4) , 2017,517-534
REFERENCES
[1] Alakesh, B., & Umapathi, G. R. (2014). A Comparative Study on [20] Shankar, M. et al. (2012). Performance Evaluation of LEACH
Advances in LEACH Routing Protocol for Wireless Sensor Protocol in Wireless Network. International Journal of Scientific &
Networks. A survey International Journal of Advanced Research Engineering Research, 3(1).
in Computer and Communication Engineering, 3(2). [21] Shigenobu Sasaki, Sabah M. Ahmed, Mohammed Abo-Zahhad,
[2] Bani, Y. M. et al. (2009). Improvement on LEACH Protocol of and Nabil Sabor. “A New Energy-Efficient Adaptive Clustering
Wireless Sensor Network(VLEACH). Protocol Based on Genetic Algorithm for Improving the Lifetime
International Journal of Digital Content Technology and its and the Stable Period of Wireless Sensor Networks” International
Applications, 3(2). Journal of Energy, Information and Communications, Vol.5,
[3] Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, Issue3 (IJEIC 2014)
I, “Low-cost elliptic curve cryptography for wireless sensor [22] Shilpa Goyal, Ms. Nisha Pandey, Computer Science and
networks” Lecture Notes in Computer Science, 4357: 6 17, 2006. Engineering Department Shri Ram College of Engg Mgmt
[4] Choi, K., Song, J., “Investigation of feasible cryptographic Palwal, India, Detection and Mitigation of Sybil Attack by
algorithms for wireless sensor network”, 8th ICACT-2006, 2, Implementing Extended Genetic Algorithm, in International
2006. Journal on Recent and Innovation Trends in Computing and
[5] Dr. Shu Yinbiao, Dr. Kang Lee, Mr. Peter Lanctot,” Internet of Communication IJRITCC June 2016 Volume: 4 Issue:
Things: Wireless Sensor Network” White Paper 2014 [23] Szczechowiak, P., Oliviera, L., Scott, M., Collier, M., Dahab, R.,
International Electrotechnical Commission-IEC, China. “NanoECC: Testing the limits of Elliptic Curve Cryptography in
(http://www.iec.ch). Sensor Networks EWSN 2008’, 4913: 305 320, LNCS,
[6] Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H., Riad, A., Springer- Verlag, 2008.
2014. Balancing energy consumption in heterogeneous wireless [24] Vikram, M., & Neena, G. (2012). Performance Analysis of QoS
sensor networks using genetic algorithm. In: IEEE Commun. Lett. Parameters for Wimax Networks. International
PP (99), 1. Journal of Engineering and Innovative Technology (IJEIT), 1(5).
[7] Fan, J., & Parish, D. J. (2007). Using a Genetic Algorithm to [25] Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S., “Energy
Optimize the Performance of a wireless Sensor Network. ISBN: analysis of public-key cryptography for wireless sensor
19025-6016-7 2007 PGNet. networks,” 3rd IEEE International Conference on Pervasive
[8] Goldberg, D. et al. (1989). Messy genetic algorithms: Computing and Communication, 2005.
Motivation, analysis, and first results. The Clearing house for [26] Wu, X. H., & Wang, S. (2010). Performance Comparison of
Genetic Algorithms (TCGA), Report 89003. LEACH and LEACH-C Protocols byNS2. Ninth International
[9] http://shodhganga.inflibnet.ac.in/bitstream/10603/22912/7/07_ Symposium on Distributed Computing and Applications to
chapter_01.pdf Business, Engineering and Science.
[10] Jai Prakash Prasad and Dr. Suresh Chandra Mohan “Security [27] Yeh, H., Chen, T., Liu, P., Kim, T., Wei, H., “A Secured
Enhancement of N-Tier Grid Protocol Using Elliptical Curve Authentication Protocol for Wireless Sensor Networks Using
Cryptography for WSN” International Journal of Computer Elliptic Curves Cryptography”, Sensors, 4767-4779, 2011.
Networks and Wireless Communications (IJCNWC), Vol.5, No 6, [28] Yu, Y., Viktor, K., & Prasanna, B. K. (2006). Introduction to
December 2015, ISSN: 2250-3501 Wireless Sensor Networks. Information Processing and Routing in
[11] Ms. Reena S. Satpute, Prof. R. S. Mangrulkar,and Prof. A. N. wireless sensor networks, World Scientific Publishing Co.,Pte.Ltd.
Thakare” Performance Analysis of Wireless Sensor Networks Retrieved from http://www.worldscibooks.com/compsci/6288.html
using Elliptical Curves Cryptography” B.D.C.O.E., Seagram
Maharashtra, India- Pin Code-442001. International Journal
of Engineering Research & Technology (IJERT) Vol. 3
Issue 7, July - 2014 ISSN: 2278-0181
[12] N. Gura, A. Patel, and A. Wander, "Comparing elliptic curve
cryptography and RSA on 8-bit CPUs,"in Proceedings of the
2004 Workshop on Cryptographic Hardware and Embedded
Systems (CHES), August 2004.
[13] Nguyen, D. T. et al. (2012). An Improved LEACH Routing
Protocol for Energy-Efficiency of Wireless Sensor Networks.
Smart Computing Review, 2(5).
[14] P. R. Gundalwar, Dr. V. N. Chavan,” A literature review on
Wireless Sensor Networks (WSNs) and its Diversified
Applications” International Journal of Advanced Research in
Computer Science (IJARCS 2012), Volume 3, No. 7, Nov-Dec
2012 ISSN No. 0976-5697
[15] Petre-Cosmin, H. et al. (2010). Hierarchical Routing Protocol
based on Evolutionary Algorithmsfor Wireless SensorNetworks. [3]
9th RoEduNet IEEE International Conference 2010.
[16] Prabhjotkaur, Aayushi Chada, Sandeep Singh,” Review Paper
of Detection and Prevention of Sybil Attack in WSN Using [4]
Centralizedids”, International Journal of Engineering Science
And Computing (IJESC), July 2016, Volume 6 Issue No. 7 [12
[17] R. Amuthavalli and R. S. Bhuvaneswaran, ”Genetic Algorithm
Enabled Prevention of Sybil Attacks for LEACH-E”, in Modern
Applied Science Vol. 9, No. 9; 2015, Published by Canadian
[18] Rupinder Singh, Dr. Jatinder Singh, and Dr. Ravinder Singh,”
SYBIL ATTACK COUNTERMEASURES IN WIRELESS
SENSOR NETWORKS”, International Journal of Computer
Networks and Wireless Communication, Vol.6, No 3, May-
June 2016, ISSN: 2250-3501(IJCNWC 2016)
[19] S.Sharmila, G Umamaheswari. (2012). ”DETECTION OF
SYBIL ATTACK IN MOBILE WIRELESS SENSOR
NETWORKS”. INTERNATIONAL JOURNAL OF
ENGINEERING SCIENCE ADVANCED TECHNOLOGY,
Volume-2, Issue-2, 256, 262,ISSN: 22503676 (IJESAT 2012)
www.ijcsit.com 534