Wireless Sensor Network Security model using

Zero Knowledge Protocol

Abstract:

Wireless Sensor Networks (WSNs) offer an excellentopportunity to monitor environments, and have a lotof interesting applications, some of which are quite sensitivein nature and require full proof secured environment. Thesecurity mechanisms used for wired networks cannot be directlyused in sensor networks as there is no user-controlling of eachindividual node, wireless environment, and more importantly,scarce energy resources. In this paper, we address some ofthe special security threats and attacks in WSNs.

We proposea scheme for detection of distributed sensor cloning attackand use of zero knowledge protocol (ZKP) for verifying theauthenticity of the sender sensor nodes. The cloning attackis addressed by attaching a unique fingerprint to each node that depends on the set of neighboring nodes and itself. Thefingerprint is attached with every message a sensor nodesends. The ZKP is used to ensure non transmission of crucialcryptographic information in the wireless network in order toavoid man-in-the middle (MITM) attack and replay attack. Thepaper presents a detailed analysis for various scenarios and alsoanalyzes the performance and cryptographic strength.

Existing System:

Existing Wireless sensor networks once sensor nodes have been deployed, there willbe minimal manual intervention and monitoring. But, whennodes are deployed in a hostile environment and thereis no manual monitoring,

Proposed System:

Nodes are divided into three categories; base station,cluster head and member nodes. Some arbitrary nodesare selected as cluster heads and generation of clusterheads is left to the clustering mechanism (not dealt inthis work). Each cluster head knows about its membernodes, while every member node knows its cluster head.

Base station stores information of all sensor nodes(including cluster heads). The base station maintainscomplete topological information about cluster headsand their respective members.

• Base station is powerful enough and cannot be compromisedlike other nodes of the network.

• There is no communication among the member nodes.

Fig:ZKP (Zero knowledge protocol) in the proposed model

Public key cryptographyis based on RSA approach. The energy consumption andcomputational latency makes RSA inappropriate for sensornetwork applications. Security algorithms that are designedspecifically for sensor networks are found to be more suitable. The goal of this paper is to develop asecurity model for wireless sensor networks. We propose amethod for identifying the compromised/cloned nodes andalso verifying the authenticity of sender sensor nodes inwireless sensor network with the help of zero knowledge protocol.

Proposed Modules:

1. Secure Zero-knowledge protocol

Zero-knowledge protocol allow identification, keyexchange and other basic cryptographic operations to beimplemented without revealing any secret informationduring the conversation and with smaller computationalrequirements in comparison to public key protocols. ThusZKP seems to be very attractive for resource constraineddevices. ZKP allows one party to prove its knowledge of

a secret to another party without ever revealing the secret.ZKP is an interactive proof system which involves a prover,P and verifier, V. The role of the prover is to convince theverifier of some secret through a series of communications.

2. Clone Attack

In clone attack, an adversary may capture a sensor nodeand copy the cryptographic information to another nodeknown as cloned node. Then this cloned sensor node canbe installed to capture the information of the network. Theadversary can also inject false information, or manipulatethe information passing through cloned nodes. Continuousphysical monitoring of nodes is not possible to detectpotential tampering and cloning. Thus reliable and fastschemes for detection are necessary to combat these attacks.

3. Man in the Middle Attack

The man-in-the-middle attack (MITM) is a form of activeeavesdropping in which the attacker makes independentconnections with the victims and relays messages betweenthem, making them believe that they are talking directly toeach other over a private connection. The attacker will beable to intercept all messages exchanging between the twovictims and inject new ones.

4. Replay Attack

A replay attack is a form of network attack in which a validdata transmission is maliciously or fraudulently repeated ordelayed. This is carried out either by the originator or byadversary who intercepts the data and retransmits it. Thistype of attack can easily overrule encryption.

Software Requirements:

Hardware Requirement:

Minimum 1.1 GHz PROCESSOR should be on the computer.

128 MB RAM.

20 GB HDD.

1.44 MB FDD.

52x CD-ROM Drive.

MONITORS at 800x600 minimum resolution at 256 colors minimum.

I/O, One or two button mouse and standard 101-key keyboard.

Software Requirement:

Operating System : Windows 95/98/2000/NT4.0.

 Technology : JAVA, JFC(Swing),J2me

 Development IDE : Eclipse 3.x