implementation of rsa security protocol for sensor networksecurity
TRANSCRIPT
-
8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity
1/8
-
8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity
2/8
Implementation of RSA Security Protocol for Sensor
NetworkSecurity: Design and Network Lifetime AnalysisObjective
In sensor network, source nodes after sensing data forwards to their next hop. There exists different
sensor topology. Data gathering nodes can be either sink or another sensor node. Considering thatdata is forwarded to base station through intermediate sensors, it is essential to protect the data
from evasdropping. In wireless technology a node can change it's MAC address and can pretend to
be one of the dorwarding nodes of a sensor . In such scenario, these attacker nodes can easily READ
the data destined for another node. In order to prevent such data licking, sensor network must
adopt critical cryptographic techniques. But pair wise cryptography needs a node to encrypt the data
and next hop to decrypt it. As sensors sends their data mainly through flooding or selective
broadcast, encryption and decryption process in every hop and in every packet adds tremendeous
overhead and hence nodes looses their energy fast.
In order to avoid such overhead objective should be to decrease number of encryption anddecryption. Hence we propose a technique where nodes are divided into clusters. every cluster has
it's own public key and every nodes have their private keys. Public key of every cluster is sent to base
station over secured communication.
Nodes encrypts their data using their private key. No node in next hop decrypts it. They forward to
clusterhead and cluster head further forwards it to base station along with appending cluster ID . as
base station stores every cluster's public key, it can easily decrypt the message.
Statement of the Problem
Existing secured sensor network adopts pair-based encryption which results in very high energy
consumption. Therefore in this work we propose a unique technique of first clustering the network
and then encrypting the data only in source nodes. Every clusterhead appends cluster ID in the
packets before sending them to base station. In base stations packets are decrypted with the public
key of the particular clusters. Cluster selection is made to be a time stamp basis. Hence cluster heads
are changed periodically and also the public key thus reducing chances of brute force prediction by
attacker node.
-
8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity
3/8
Implementation of RSA Security Protocol for Sensor
NetworkSecurity: Design and Network Lifetime AnalysisSystem Design
Security Block Diagram
Encryption Decryption System
-
8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity
4/8
Implementation of RSA Security Protocol for Sensor
NetworkSecurity: Design and Network Lifetime AnalysisCluster Head Based Topology
RSA Algorithm
-
8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity
5/8
Implementation of RSA Security Protocol for Sensor
NetworkSecurity: Design and Network Lifetime Analysis
Algorithm
Encryption:
Encryption is done using the public key component e and the modulus n. To whomever we need to
send the message, we encrypt the message with their public key (e,n). Encryption is done by taking
an exponentiation of the message m with the public key e and then taking a modulus of it. The
following steps are done in encryption.
-
8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity
6/8
Implementation of RSA Security Protocol for Sensor
NetworkSecurity: Design and Network Lifetime Analysis1. Obtain the recipients public key (n,e)
2. Represent the plaintext message as a positive integer m < n
3. Compute the ciphertext c = m^e
mod n.
4. Send the ciphertext c to the recipient.
Decryption:
Decryption is done using the Private key. The person who is receiving the encrypted message
uses his own private key to decrypt the message. Decryption is similar to the encryption
except that the keys used are different.
1. Recipient uses his private key (n,d) to compute m = c^d
mod n.
2. Extract the plaintext from the integer representative m.
The RSA algorithm has been implemented in many applications and it is currently one of the
most popularly used encryption algorithm. RSA algorithm is based fully on mathematics and
in the next section we will see the mathematics behind RSA.
Communication Hierarchy
-
8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity
7/8
Implementation of RSA Security Protocol for Sensor
NetworkSecurity: Design and Network Lifetime Analysis
-
8/12/2019 Implementation of RSA Security Protocol for Sensor NetworkSecurity
8/8
Implementation of RSA Security Protocol for Sensor
NetworkSecurity: Design and Network Lifetime AnalysisImplementation