Indonesian J
ournal of Ele
c
trical Engin
eering and
Computer Sci
e
nce
Vol. 2, No. 2,
May 2016, pp
. 431 ~ 451
DOI: 10.115
9
1
/ijeecs.v2.i2.pp43
1-4
5
1
431
Re
cei
v
ed Fe
brua
ry 21, 20
15; Re
vised
Ap
ril 23, 201
6; Acce
pted
April 30, 201
6
A Lightweight Symmetric Cryptography Scheme for
Identifying Compromised Node in WSN
Yassine Mal
e
h*
1
, Abdellah Ez
z
a
ti
2
1
Departem
ent of Mathematics
and Co
m
puter
Sciences, LAV
E
T
E
Laborat
ory, Hassa
n 1st Univers
i
t
y
, 5
7
7
Casa
bla
n
ca R
oad, F
S
T
de Settat, Km 3, Mo
rocco
2
LAVET
E Laborator
y
,
Facu
lt
y
of Science a
n
d
T
e
chnol
og
y
*Corres
p
o
ndi
n
g
author, e-ma
i
l
:
y
.
male
h@
uh
p.ac.ma
A
b
st
r
a
ct
W
i
reless Sens
or Netw
ork (WSN) is consisti
ng of
ind
epe
nd
ent and d
i
strib
u
ted sens
ors to mo
nito
r
physic
a
l or e
n
v
iron
me
ntal c
o
nditi
ons, such
as temperat
ur
e, soun
d, pres
sure, et
c. T
he most cruci
a
l
and
funda
menta
l
chall
e
n
ge faci
n
g
W
S
N is se
curity. D
ue to
min
i
mu
m ca
pacity in
-ter
m of me
mory c
o
st,
process
i
ng and physic
a
l acc
e
ssibility to sensors devic
es
the security attacks are problematic. They ar
e
mostly d
e
p
l
oye
d
in op
en ar
ea,
w
h
ich expos
e them to d
i
ffere
nt kinds of atta
cks. In this paper, w
e
present a
n
illustrati
on
of different attac
ks and vu
ln
erabil
i
ti
es i
n
W
S
N. Then w
e
propos
ed
a
new
lightw
e
i
g
h
t
cryptogra
phy
a
l
gorit
hm for id
e
n
tifying c
o
mpr
o
mise
d no
de
i
n
W
S
N call
ed
Lea
p En
hanc
e
d
. Our eval
uati
ons
on T
O
SSIM give a precis
e a
nd deta
i
l
ed id
ea of the extr
a cost of cons
umptio
n of resources n
e
e
ded
to
ensur
e the hi
g
h
leve
l of expe
cted security c
o
mpar
ed to oth
e
r cryptogra
p
h
y
schemes in l
i
t
erature.
Ke
y
w
ords
: Wireless Se
nsor
Netw
ork, Key ma
na
ge
me
nt, LEAP, Cryptog
r
aphy, TinyOS
Copy
right
©
2016 In
stitu
t
e o
f
Ad
van
ced
En
g
i
n
eerin
g and
Scien
ce. All
rig
h
t
s reser
ve
d
.
1.
Introduc
ti
on
Inexpen
siven
e
ss, energy efficien
cy, and con
s
i
s
te
n
c
y in perform
an
ce is the n
e
e
d
of the
day for ele
c
tronic
com
m
un
ication. Thi
s
has l
ed to
the
advan
ceme
n
t
of wirele
ss tech
nolo
g
ies
and
micro-el
ect
r
o-mech
ani
cal systems (ME
M
S). Which
in turn made
it is possibl
e to make l
o
w
power tiny de
vices that run
autonom
ou
sl
y. Which
evol
ve a new
cla
ss of di
strib
u
ted networkin
g
named wirele
ss sen
s
o
r
net
works
(WSNs).
Today we fin
d
this
kind
of netwo
rk i
n
a
wi
de
ran
ge
of potential a
pplication
s
, inclu
d
ing
se
curity and
surveill
an
ce, control, actua
t
ion and
main
tenan
ce of co
mplex system
s and fine
-g
ra
in
monitori
ng
of indoo
r
and o
u
tdoor enviro
n
ments.
T
he
majority of these a
ppli
c
atio
ns a
r
e de
ploy
ed
to monitor
an
are
a
an
d to
have a
rea
c
ti
on when th
ey regi
ster
a crit
ical eve
n
t. Th
e data d
o
e
s
no
t
need to b
e
confidential in
area
s
su
ch
as
capt
u
r
ing
indoo
r an
d o
u
tdoor
enviro
n
mental eve
n
t
s.
Ho
wever, the
confid
entiality of data ca
n be e
s
sent
i
a
l in othe
r a
pplication
s
, such
as fo
r the
security of a territory in military [1] [2].
The different
cha
r
a
c
teri
sti
cs
of se
nsor net
wo
rks
su
ch a
s
(ene
rg
y limited, low po
we
r
cal
c
ulatio
n, u
s
e
of radio
waves, et
c.)
re
pre
s
ent
s a
ch
alleng
e for re
sea
r
che
r
s co
mmunity. On
e of
the key obj
e
c
tives is th
e energy co
nsumption of
n
ode
s that ai
ms to extend
the life of such
netwo
rk. T
he
necessa
ry protocol
s fo
r th
e functio
n
ing
of WSN
su
ch
as me
dium a
c
cess p
r
oto
c
ols,
routing
a
nd
secu
rity mu
st
take i
n
to
account th
e
con
s
traint
s of
ne
twork nod
es while
saving as
much
as po
ssible th
eir e
n
e
rgy con
s
um
ption. The p
u
rpo
s
e
of the pro
p
o
s
ed
new
proto
c
ol
s fo
r
WSN i
s
to
m
a
ke
a
com
p
romise
bet
we
en the
qualit
y
of se
rvice Q
o
S provi
ded
by these solu
tions
and the re
sp
e
c
t of the limitati
ons imp
o
sed by netwo
rk nod
es.
Therefore, it i
s
ne
ce
ssary t
o
use effective
mechani
sm
s to protect t
h
is type of ne
tworks.
Ho
wever,
it is well
kno
w
n
that the
en
cry
p
tion
sy
stem
s re
pre
s
e
n
t a
first li
ne
of d
e
fense a
gain
s
t
all
types of attacks. Fu
rthe
rmore, crypt
ogra
phi
c techniqu
es mu
st be desig
n
ed to detect
the
executio
n of the most da
n
gero
u
s atta
cks. In addi
tion, these tech
ni
que
s must be
small to fit
the
limited re
sou
r
ce
s of the WSN.
Senso
r
no
de
s are limited i
n
term
s of co
mput
ing, me
mory and
en
ergy capa
citi
es, the
s
e
limitations
affect ne
gativel
y the functio
n
ing of
th
e speci
a
l smart
techni
que
s t
hat provide t
he
requi
re
d
secu
rity. Key man
ageme
n
t p
r
ot
ocol
s
provid
e
safe
path
s
i
n
sen
s
or net
works. Th
e id
ea
is befo
r
e op
ening the
sa
fe route; nod
es mu
st
sh
a
r
e some ide
n
tification an
d authenti
c
at
ion
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 2, May 2016 : 431 –
451
432
informatio
n. These securit
y
keys al
so n
eed a m
ana
g
e
ment sy
ste
m
that take
s
respon
sibility
for
the cre
a
tion, maintena
nce and security of key distrib
u
tion [2].
In this work we prop
ose a lightwei
ght se
cu
rity sch
eme
for identifying
comp
romi
se
d node
in WSN. Our
proposed
scheme is
based on the famous LEAP prot
oc
ol, proposed by Zhou. T
h
is
proto
c
ol i
s
de
sign
ed to
secure
network
communi
catio
n
s
with th
e p
r
imary g
oal i
s
to immedi
atel
y
limit the imp
a
c
t of the
security of a
co
mpromi
se
d n
ode
on th
e n
e
twork. T
he
proto
c
ol
su
pp
orts
four types of
keys that a
r
e
excha
nge
d to meet t
he different requi
re
ments of
the
se
curity of WSN:
Individual Ke
y: Shared wit
h
the base st
ation
Pairwi
se Key: Shared
with anothe
r se
nsor nod
e
Clu
s
ter Key: Share
d
with several nei
ghb
oring n
ode
s
Global Key: Share
d
by all node
s in the n
e
twork.
The critical a
s
sumption th
at leap
+ ha
s
con
s
id
ere
d
is that within T
m
in a no
de cannot be
comp
romi
se
d
.
This hyp
o
th
esi
s
seem
s
convenie
n
t,
bu
t only und
er i
deal
con
d
itio
ns, it is
po
ssi
ble
that Tmin
be
greate
r
th
an t
he o
ne
assu
med. To
ad
dress thi
s
limita
t
ion, we
prop
ose
two
mod
e
ls,
the first use
a periodi
c verificatio
n
"Periodi
c Che
c
k" to detect the comp
rom
i
sed no
de. T
he
se
con
d
mode
l execute a seque
nce num
ber in e
a
ch
n
ode an
d co
m
pare
d
them a
fter the pairwi
s
e
key e
s
tabli
s
h
m
ent
step
wit
h
the
inform
ation
stor
ed i
n
t
he b
a
se
station BS,
which
then m
a
kes the
deci
s
io
n on
wheth
e
r to d
e
lete the sh
ared
key. O
u
r evaluatio
n
have been
impleme
n
ted
o
n
TOSSIM sim
u
lator, and it give a preci
s
e and deta
ile
d idea of the extra co
st of the co
nsumpti
on
of reso
urce
s required to en
sure t
he high
expecte
d level of security.
This
wo
rk will
be o
r
ga
nize
d as well. In the second
p
a
rt, we i
dentif
y the variou
s attacks
and vuln
era
b
ilities in
WSN. We
prese
n
t then a
st
a
t
e of the art
in term
s of key manag
em
ent
algorith
m
s fo
r WS
N. Later, we will di
scuss an
d
anal
ysis o
u
r p
r
op
ose
d
sch
e
me
. We evalu
a
te
Leap Enh
a
n
c
ed in terms of conne
ctivity, memory
compl
e
xity, scala
bility, and resi
stan
ce
to
attacks, a
nd
then
we
com
pare
it to oth
e
r
schem
es
prop
osed i
n
t
he literature. This to
pic en
ds
with a gen
era
l
con
c
lu
sion a
nd a set of pe
rsp
e
ctive
s
.
2. Differen
t
Kind of Attacks and Vul
n
er
abilities in Wireless S
e
nsor
Net
w
o
r
ks
The different
cha
r
a
c
teri
sti
c
s of wi
rele
ss
sen
s
o
r
net
works (ene
rg
y limited, low-p
o
wer
c
o
mputing, us
e of radio waves
,
etc
...) expos
e them to many s
e
c
u
rity threat
s
.
The different
c
h
ar
ac
te
r
i
s
t
ics
o
f
w
i
re
les
s
s
e
ns
or
ne
tw
or
ks
(
e
ne
rgy li
mited, low-po
wer computin
g, use of
radi
o
waves, etc...) expose them to
many security
threat
s. Without proper security
measurements
sensor net
work
will be exposed to
multi
p
le attacks. T
he two
general
categories
of
attacks that
are po
ssi
ble on
a wirele
ss
net
wo
rk ge
nerally ar
e Ac
tive and Pas
s
i
ve Attac
ks lis
tening and
monitori
ng th
e com
m
uni
cation chann
e
l
by unautho
rize
d attacke
r
s i
s
con
s
ide
r
ed a
s
p
a
ssi
v
e
at
t
a
ck.
T
h
e
s
e
at
t
a
ck
s m
a
k
e
it
pos
sibl
e
to retrieve
da
ta from the n
e
twork b
u
t d
o
not influe
n
c
e
over it behavi
o
r. [4] [5] [6].
2.1. Routing
Attac
ks in Sensor
Net
w
o
r
ks
2.1.1. Spoofed, Alter
e
d, or Re
play
ed Rou
t
ing
Info
rmation
The mo
st direct attack ag
ainst a routin
g prot
o
c
ol i
s
to target the routin
g informatio
n
excha
nge
d b
e
twee
n nod
e
s
. By spoofin
g, altering,
o
r
replayin
g ro
uting inform
a
t
ion, adversa
ries
may be able
to cre
a
te ro
uting loop
s, attract o
r
repel
netwo
rk t
r
af
fi
c, extend o
r
sho
r
ten
sou
r
ce
route
s
, ge
nerate false
erro
r me
ssage
s, and
p
a
rtition the
network
, increa
se end
-to-e
nd
late
n
c
y
and so on.
2.1.2. Selectiv
e
For
w
a
rdi
ng
Only ce
rtain
packet
s
can
be d
r
op
sel
e
ctively
by a
malicio
us
no
de. Thi
s
is e
ffective
spe
c
ially if i
s
combi
ned
wit
h
an
attack
which
gath
e
r
m
u
ch
traffic through
the
nod
e. It is a
s
sum
ed
in sen
s
o
r
net
works that no
des
sin
c
erely forwa
r
d
a
nd receive me
ssa
ges. In situati
on wh
ere
so
me
of the comp
romise
d n
ode
refu
sed to
forwar
d pa
cket the nei
gh
bors may
sta
r
t usi
ng a
not
her
route. [7] [8]
2.1.3. Spoofed, Repla
y
ed and
Alte
re
d Routin
g Informatio
n
Ad ho
c routin
g that is un
protected
is vul
ner
a
b
le to t
h
ese
kin
d
s of
attacks
be
ca
use
every
node a
c
t as a
router a
nd h
ence ca
n dire
ct
ly affect rou
t
ing informati
on. Like:
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
A Lightweig
ht Sym
m
e
tric Crypto
graph
y
Schem
e for Identifyin
g
…
(Yassi
ne Mal
e
h)
433
Extend or sh
orten servi
c
e
route
s
Gene
rate false error me
ssage
s
Cre
a
te ro
utin
g loop
s
Incre
a
se end
-to-end late
ncy
2.1.4. Sy
bil
Attac
k
s
T
h
i
s
ki
n
d
o
f
a
tta
ck ta
rg
e
t
s faul
t to
l
e
ran
t
sch
eme
s
l
i
k
e
mu
l
t
i
p
a
t
h
rou
t
i
n
g
,
d
i
stri
b
u
t
e
d
sto
r
ag
e
and
topol
og
y ma
int
ena
nce. A no
d
e
dup
lic
ate
itse
lf and pr
esent i
n
the multi
p
le l
o
catio
n
s. In the net
w
o
rk
a sin
g
l
e
node,
pre
s
e
n
t
multiple id
e
n
tities in
a S
y
bil attack a
s
sh
own in
fig
u
re
1. To
p
r
e
v
ent Sybil attack
authenti
c
atio
n and en
crypt
i
on tech
niqu
e
s
ca
n be u
s
e
d
. [7]
C
Figure 1. Sybil attack
2.1.5. Sinkhole Attack
Sinkhol
e atta
ck is to
attra
c
t traffic to
a
specif
i
c
n
ode.
The m
a
in
go
al of th
e atta
cker h
e
re
is to attra
c
t n
early all the t
r
affic from a
p
a
rticul
ar
are
a
throug
h a
co
mpromi
se
d n
ode. Thi
s
can
be
done by ma
ki
ng the com
p
romise
d nod
e the most attra
c
tive to the neighb
or no
de
s.
2.1.6. Worm
hole Attac
k
In this
kind
of attack an
attacker re
co
rd
s
packet
at on
e location, tu
nnel the
m
to
anothe
r
locatio
n
in the netwo
rk a
n
d
then retran
smit t
hem into the netwo
rk as sh
own in figure 2.
Figure 2. Wo
rmhole attack
2.1.7. Hello Flood Attac
k
In hello floo
d
attack, the
attacker
use
s
hell
o
pa
ckets a
s
a
we
apon to
con
v
ince the
sen
s
o
r
s in th
e network. Attacker
se
nd
s
a ro
uting
p
r
ot
ocol
hello
pa
cket from
one
node
to a
not
her
with mo
re
en
ergy. An
attacker
with
a
high
pro
c
e
s
si
ng p
o
wer
an
d tran
smi
s
sio
n
ra
nge
sen
d
s
Hello
pa
ckets to a num
ber of sen
s
o
r
n
o
de that a
r
e i
s
olated in
a la
rge
are
a
with
in the net
wo
rk.
The sen
s
o
r
s
thus g
e
t co
n
v
inced th
at the adve
r
sary
is their
neig
hbor. A
s
a result, the victim
node
s try to go thro
ugh t
he attacke
r
, as they kno
w
that it is their neig
hbo
r while se
ndin
g
the
informatio
n to the base
station
(BS) a
s
shown in figure 3.
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 2, May 2016 : 431 –
451
434
Figure 3. Hell
o flood attack
2.2. Denial of Serv
ice Attacks
In this
kin
d
of attack, t
he o
b
je
ctive of
the
mali
ciou
s
adversary is to av
oid the
provisi
onin
g
of servi
c
e. Th
e most
comm
on and b
a
si
c
dos atta
cks can be:
2.2.1. Po
w
e
r
Exhaus
tion Attac
k
An attacke
r i
m
pose a com
p
lex task to a
sen
s
or n
ode
in order to u
s
e its battery
life. As
we are awa
r
e
of the fact senso
r
are lo
w
power
devi
c
e
s
with limited sup
p
ly of energy. In addition,
sen
s
o
r
no
de
s are limited
with co
mput
ational capa
bilities, so th
is attack can
slow
do
wn
the
reac
tion time.
2.2.2. Jamming Attac
k
This i
s
the primary physi
cal layer DoS
attack
against WSN. In this
k
i
nd of attac
k
,
the
attacker emit
s radi
o freq
ue
ncy sig
nal
s that do
not follow an un
derlyi
ng MAC protocol, which lead
to a pro
b
lem
that none
of the mem
ber
o
f
the netwo
rk
in the affecte
d
are
a
will
be
able to
sen
d
or
receive any packet. In other word
s, the adversa
ry tires to tran
smit sign
als
to the receivi
ng
antenn
a at the sam
e
fre
quen
cy ban
d
or sub b
a
n
d
as the tra
n
smitter, whi
c
h cau
s
e
s
radio
interferen
ce. The attacke
r
need
s hig
h
e
nergy
to disru
p
t continu
o
u
s
ly the network [9].
2.2.3. Node
Subv
ersion
In this ki
nd
of attack, the
whol
e sen
s
or net
wo
rk
may be com
p
romi
se
d be
cau
s
e th
e
captu
r
e no
de
may reveal cryptograp
hic
keys.
2.2.4. Node
Outa
ge
In this kin
d
o
f
attack a
situation, o
ccu
r
whe
r
e the n
ode
stop
s its function. He
nce, the
sen
s
o
r
n
e
two
r
k protocol
should be rob
u
st
e
noug
h t
o
mitigate th
e effect
s of
node
outag
e
s
by
providin
g
an alternate rout
e.
2.2.5. Ph
y
s
ic
al Attack
s
As we have mentione
d re
peatedly
th
at sen
s
o
r
n
e
two
r
k op
erate
in
outdoo
r e
n
vironment
mostly
which
ma
ke hig
h
ly
su
scepti
b
le
to physi
cal attack. This co
de b
e
phy
sical node
destructio
n
. This attack i
s
d
i
ffe
rent from
others in the
sen
s
t
hat he
re a node
ca
n be pe
rman
en
tly
damag
ed o
r
destroyed.
2.2.6. Node
Replica
t
ion Attac
k
s
In this
kind
o
f
Attack a
no
de i
s
ad
ded
to
the existin
g
sen
s
or net
work
by copy
ing the
node I
D
of an
existing
sen
s
or no
de. Thi
s
can
seve
rely
disrupt the
sensor n
e
two
r
k pe
rforman
c
e.
The pa
cket can be misrou
ted or even corru
p
ted,
which can lea
d
to disco
nn
ected net
wo
rk or
false
sen
s
o
r
readi
ng et
c. Once the att
a
cker
get
ph
ysical
acce
ss to the entire
netwo
rk, it can
copy the keys to the replica
t
ed sen
s
o
r
no
des.
2.2.7. Passiv
e
Informatio
n Gath
ering
If the sen
s
o
r
netwo
rk is
not en
crypte
d, an a
d
versary havin
g p
o
we
rful reso
urces can
colle
ct inform
ation from it. If the intruder i
s
:
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
A Lightweig
ht Sym
m
e
tric Crypto
graph
y
Schem
e for Identifyin
g
…
(Yassi
ne Mal
e
h)
435
Appro
p
riate p
o
we
r re
ceive
r
Well de
sig
n
e
d
antenn
a
Then it
can
easily pi
ck of
f the data st
ream
. If the messag
e inte
rce
p
tion
cont
ains th
e
physi
cal lo
cat
i
on of
sen
s
o
r
nod
es th
en i
t
allows atta
cker to lo
cate
the no
de a
n
d
de
stroy the
m
.
The adve
r
sa
ry can
ob
serve the spe
c
i
f
ic co
ntent
of a
me
ss
a
ge th
a
t
in
c
l
u
des
time
s
t
amps
,
messag
e IDs and
othe
r fiel
ds. Stro
ng e
n
c
ryption
te
ch
nique
s n
eed
to be
used i
n
orde
r to
prevent
passive information gathe
ring.
3. Related Works
Wirel
e
ss sen
s
or n
e
two
r
ks are highly vulnerabl
e a
g
a
inst attacks, it is very important to
adopt some
mech
ani
sm
s that
can protect
the
n
e
tw
ork from
all
kind
s of atta
cks. It must
be
ensure that t
he syste
m
is prot
e
c
ted b
e
fore, du
ring
and after a
n
y kind of at
tack. Th
e m
o
st
importa
nt tools that ensu
r
e se
curi
ty an
d its servi
c
e
s
are the se
curity primitiv
es [10]. Tho
s
e
primitives
are s
y
mmetric k
e
y enc
r
ypt
i
on (SKE)
, public
k
e
y cryptogr
aphy (PKC) and has
h
functions [11]. SKE and
Hash functi
ons are the
primi
t
ives that
ca
n be
called the building bl
ocks
whi
c
h offer a
basi
c
prote
c
t
i
on of the informatio
n flow, becau
se th
ese a
s
sure the co
nfidenti
a
lity
and integ
r
ity
of the chann
e
l
. Public key cryptog
r
a
phy assures p
r
ote
c
tion from the
particip
a
tion of
external e
n
tities an
d elimin
ates the p
r
ob
lem of
a mali
ciou
s in
side
r,
which try to use m
o
re th
a
n
one ide
n
tity.
PKC assures
this by allowi
ng authe
ntic
a
t
ion of the peers involve
d
in the informat
ion
excha
nge. Base
d on the
primitives
it is po
ssi
ble to
creat
e a bet
ter netwo
rk service
s
. It is also
equally i
m
po
rtant to
hav
e a
key m
anag
ement
system
for
con
s
tru
c
ting
a
se
cu
re
key
infras
t
r
uc
ture.
3.1. Method
s
and Protoco
l
s Classifica
tion
Most methods based on symmetr
ic, a
symmetric o
r
h
y
brid sy
stem
s solve the p
r
oblem of
key e
s
tabli
s
h
m
ent throug
h
a p
r
e
d
istri
b
u
t
ion ph
as
e. T
he p
r
edi
stri
b
u
tion of
en
cryption keys i
n
a
WSN i
s
th
e f
a
ct of
stori
ng
these
keys in
the
me
mory node
s before
deploym
ent. In
literatu
r
e, we
find several classificatio
n
s
of cryptog
r
ap
hic
key
mana
gement sy
ste
m
s, su
ch a
s
pape
rs in [12
]
-
[14].
Some cl
assifi
cation
s m
e
th
ods
are ba
se
d on
key
sha
r
ing
between
two no
de
s (P
airwi
s
e
)
or
mo
re nod
es (Group
-wi
s
e), and oth
e
rs
rely
o
n
exploiting th
e pro
babilitie
s, co
mbinato
r
y
analysi
s
, etc.
We
cho
s
e t
o
make a
cl
assificatio
n
, whi
c
h in
clud
es all
key m
anag
ement a
n
d
distrib
u
tion m
odel
s into two large famili
es. Th
e fi
rst family co
ntain
s
the
asymm
e
trical
sch
e
m
e
s
and the seco
nd incl
ude
s the symmet
r
ical schem
es.
Fi
gure 4 illust
rates thi
s
cl
a
ssifi
cation. In
the
following, we
will detail the
main models
in literature.
3.2. Sy
mmetric Schemes
The
schem
e
s
in t
h
is
cat
egory
use
symmetric
me
cha
n
ism
s
i
n
ord
e
r to
e
s
tablish
a
comm
on key betwe
en two
node
s in a WSN. This is a
c
compli
she
d
in three
steps:
Key predi
stri
bution: keys
store
d
in m
e
mory
befo
r
e
deployme
nt constitute the
key rin
g
of
node. If there
is a
commo
n key b
e
twee
n two n
ode
s,
they can
cre
a
te a secure
con
n
e
c
tio
n
betwe
en the
m
.
Share
d
-key discovery: After deployin
g
the
commu
nicatio
n
prot
ocol i
s
re
sp
onsi
b
le fo
r
discoveri
ng the com
m
on
key betwee
n
two nei
ghbo
ri
ng nod
es.
Path-key est
ablishment: if there is n
o
comm
on
key between
two node
s wishi
ng to
comm
uni
cate
, there mu
st then find a
se
cure path
bet
wee
n
them. T
h
is p
a
th goe
s throug
h a
set
of nod
es that
alre
ady contain
s
se
cure
lin
ks.
On
ce
the p
a
th e
s
t
ablished, th
e
two n
ode
s
can u
s
e it to se
cure co
mm
unication.
We p
r
e
s
ent in the followin
g
symmetri
c
a
l
sch
eme
s
according to the
decom
po
sition of figure 4.
3.2.1. SPINS
SPINS is a suite of secu
rity building blo
c
ks propo
se
d
by Perig and several othe
r authors
in [15]. It is
optimiz
ed for res
o
urce
c
o
ns
trai
ned
en
vironme
n
ts a
nd wi
rel
e
ss
comm
uni
cati
on.
SPINS ha
s t
w
o
se
cu
re
b
u
ilding
blo
cks: SNEP
an
d
μ
TESLA. SNEP
us
es
a
shared
counter
betwe
en the two communi
cating pa
rtie
s and applie
s t
he co
unter in
calculating e
n
cryptio
n
and
a
messag
e
aut
hentication code (MAC)
to
provides d
a
ta co
nfidenti
a
lity, semanti
c
security, d
a
ta
integrity, two-party data a
u
t
henticat
io
n, replay protecti
on, and
we
ak
messag
e fre
s
hn
ess. What
’s
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 2, May 2016 : 431 –
451
436
more, the
protocol
also has l
o
w
co
mmuni
cati
on
overhe
ad, for the
cou
n
ter state i
s
ke
pt at
each end poi
nt and the protocol only add
s 8 by
tes per messa
g
e
. For appli
c
ations requi
ri
ng
stron
g
freshn
ess, the
sen
der
create
s
a ra
ndom
no
nce
(a
n u
npredicta
b
le 6
4
-bit value) an
d
inclu
d
e
s
it in the requ
est
messag
e to the re
ceiver. The re
ceiv
er ge
nerates the respon
se
messag
e an
d includ
es th
e non
ce in the MAC co
mputation.
μ
TESLA provides a
u
thenti
c
ated
broa
dcast fo
r seve
rely
re
s
ource
-con
stra
i
ned enviro
n
m
ents.
μ
TES
L
A co
nst
r
u
c
ts a
u
thenti
c
at
ed
broa
dcast fro
m
symmetri
c
primitives, bu
t intr
odu
ce
s a
s
ymmetry wit
h
delayed
ke
y disclo
s
u
r
e a
n
d
one-way fu
nction key
ch
ain
s
. SPINS re
al
ize
s
an
aut
he
nticated
ro
uting ap
plicatio
n and
a
se
curity
two-p
a
rty key
agre
e
ment
with SNEP a
nd
μ
TESLA separately wit
h
low
stora
g
e
,
calcul
ation
and
comm
uni
cati
on consumpti
on. Howe
ver,
SPINS still have some underlying probl
ems as follows:
It doesn’t co
n
s
ide
r
the po
ssibility of DO
S attack;
Due to
use th
e pairwi
s
e
ke
y pre-distri
but
ion sch
e
me
I
the se
cu
rity routing p
r
oto
c
ol, SPIN
S
rely on the base station
exce
ssively;
SPINS doe
s
not con
s
ide
r
the up
date o
f
comm
uni
cat
i
on
key. The
r
e mu
st be
practical
key
update me
ch
anism to reali
z
e forwa
r
d se
curity;
SPINS canno
t solve the problem of hidd
en ch
ann
el le
ak an
d com
p
romise n
ode.
3.2.2. LEAP
LEAP (Locali
z
ed Encryption and Authentication
Protocol) i
s
a key management protocol
for se
nsor
ne
tworks th
at is desi
gned to
sup
port in
-net
work p
r
o
c
e
s
si
ng with the
prime goal
at the
same
t
i
me t
o
re
st
rict
t
he
se
curit
y
imp
a
c
t
of
a no
de,
whi
c
h i
s
co
mpromi
se
d to the imme
di
ate
netwo
rk n
e
i
ghbo
rho
od. The idea of
leap+ was motivated after having
this intere
sting
observation t
hat different t
y
pes of me
ssage
s
that
are
excha
nged betwe
en sen
s
or nod
es ha
ve
different re
qu
ireme
n
ts of secu
rity. This obser
vation
gives the co
nclu
sio
n
that a single keying
mech
ani
sm i
s
not suitable
for meeting
these diffe
re
nt security re
quire
ment
s [16] [17] [18]. For
each nod
e le
ap su
ppo
rt the establi
s
hm
ent of four types of key
s
:
Individual key: Shared with
the base stati
on;
Pairwi
se
key: Shared
with anothe
r se
nsor nod
e;
Clu
s
ter Key: Share
d
with
multiple neig
hbori
ng no
de
s;
Global
key: Share
d
by all node
s in the n
e
twork.
The
pa
ckets that e
a
ch n
ode
exch
ang
ed in
a
sen
s
or
network
can b
e
cla
s
sified into
several cate
g
o
rie
s
, whi
c
h i
s
ba
sed o
n
di
fferent crite
r
ia
for example:
Control pa
ckets vs Data p
a
ckets
Broad
ca
st Packets Vs
Uni
c
ast Packet
s
Queri
e
s o
r
co
mmand
s Vs
Senso
r
re
adi
ngs a
nd so o
n
.
The
se
cu
rity requi
rem
ent f
o
r e
a
ch p
a
cket is diffe
rent
it depe
nd
s o
n
the
categ
o
ry it falls
in. Almost
all
type of pa
cke
t
s r
equi
re
s a
u
thentication
while
confide
n
tiality is o
n
ly for
som
e
typ
e
s
of pa
ckets.
Here it i
s
m
entione
d that
sin
g
le
k
e
ying
mec
h
an
ism is
n
o
t
ap
pr
op
r
i
a
t
e fo
r
a
ll
th
e
se
cure co
mm
unication that
are nee
ded i
n
sen
s
o
r
net
works.
3.2.3. Tin
y
sec
Karlof et al. [19] prop
ose the TinySec P
r
otoc
ol, the first full imple
m
entation of a se
cure
architectu
re
a
t
the data link layer for
WS
N. This
i
m
ple
m
entation
su
pport
s
two
se
curity optio
ns: a
messag
e aut
hentication with data encryption (T
inySec-EA
)
and
authenti
c
atio
n of messag
es
without data
encryption
(TinyS
ec-Aut
h). As SPINS, TinySec use
s
standa
rd crypto
gra
p
hic
algorith
m
s to
ensu
r
e priv
acy and me
ssag
e integr
ity
che
ck. The
authors
of Tinyse
c find that
Skipja
ck alg
o
r
ithm [20] i
s
more
suitable
for
WS
N tha
n
RC5
(al
gori
t
hm used
by
SPINS). Inde
ed,
evaluation
s
o
f
TinySec have s
hown that RC5 ne
ed
s a pre
-
key calcul
ation usi
ng 104 bytes of
RAM. TinySec uses th
e CBC e
n
cryption mod
e
(Ci
pher Blo
c
k Chainin
g
) in
stead of the CT
R
(used
by SPINS). Ind
eed,
the
CT
R
will
provide
fo
r
more
pa
cket
encryption
th
e same
rand
om
numbe
rs. Th
ese
numb
e
rs a
r
e u
s
e
d
prima
r
ily in
the produ
ction of the
encryption
keys
seq
uen
ce
s; their repetitio
n can
wea
k
e
n
the se
curit
y
level of this sol
u
tion an
d sub
s
e
quen
tly
allowin
g
a
d
ve
rsa
r
ie
s to
di
scover the
con
t
ent of
me
ssa
ges.
TinySec is
an i
m
plem
entation
rath
er
than a
key di
stributio
n p
r
o
posal, he
co
mes to
co
mpl
e
te a
key di
stribution
meth
od suited to t
he
expand
ed net
work. T
w
o no
des
need t
w
o
-
sh
ared sym
m
etric
key to
comm
uni
cate
. The first u
s
ed
to encrypt me
ssage
s an
d the se
co
nd fo
r calculating M
A
C (code
) m
e
ssag
es.
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
A Lightweig
ht Sym
m
e
tric Crypto
graph
y
Schem
e for Identifyin
g
…
(Yassi
ne Mal
e
h)
437
3.3. As
y
mme
tric Scheme
s
The sch
e
me
s in this categ
o
ry use the mech
ani
sm
s of asymmetri
c
syste
m
s in
orde
r to
establi
s
h a
co
mmon key be
tween two no
des
o
r
a grou
p of node
s of a WSN.
3.3.1. Micro-PKI
Munivel et
al [21] p
r
op
ose
a m
e
th
od for WS
N
called
mi
cro
-
PKI (Pu
b
lic Key
Infrastructu
re
Micro), a
sim
p
lified version
of c
onve
n
tio
nal PKI. The base statio
n
has
a pu
blic
key
and
anoth
e
r
private. Th
e
publi
c
key i
s
used
by the
network
nod
es to
a
u
then
ticate the
b
a
s
e
station, a
nd t
he p
r
ivate
ke
y is
use
d
by
the ba
se
stat
ion to
de
cryp
t data
se
nt from the
no
de
s.
Before de
plo
y
ment, the public key of the base stat
io
n is sto
r
ed in
all node
s. Th
e autho
rs in
cl
ude
in their
sche
me two type
s of authenti
c
a
t
ion (Hand
sh
ake
)
. The first type of authenticatio
n o
c
curs
betwe
en a n
e
twork n
ode
and the b
a
se
station.
The
node g
ene
rat
e
s a
symmet
r
ic
se
ssi
on key
and en
crypts it with the public
key of the ba
se
station. To en
su
re the integ
r
ity of messag
es
excha
nge
d, the auth
o
rs p
r
opo
se to inte
grate
with e
a
c
h m
e
ssa
ge
a MAC
(code
) u
s
ing th
e sa
me
encryption
ke
y of the message. Fo
r
ne
w node
s wh
o
wish to join the network, they simply st
ore
in these n
ode
s, the publi
c
key of
the base station befo
r
e depl
oymen
t
.
3.3.2. Tin
y
PK
Watro et al. [22] propo
sed
a metho
d
cal
l
ed TinyPK b
a
se
d on th
e u
s
e of p
ubli
c
keys an
d
the p
r
in
ciple
of Diffie-Hell
man to
e
s
tab
lish
a
se
cret
key b
e
twe
en
two n
ode
s i
n
a
WSN.
Tin
y
PK
use
s
a tru
s
te
d autho
rity to
sig
n
the
pu
blic
ke
ys of
node
s. Th
e
CA key is
predistri
buted
to all
node
s befo
r
e
deployment
so they
ca
n check key nei
ghbo
rs afte
r deployme
nt. The choi
ce of
the
RSA algo
rith
m for e
n
crypt
i
on involve
s
a great co
n
s
umption
of time an
d en
ergy of the no
des.
Thus, the basic
operation
s can take
dozen second
s, whi
c
h will
reduce t
he network lifetim
e as
well as
affec
t
reac
tivity.
3.3.3. PKKE & C
BKE
The PKKE and CBKE protocol
s proposed by Zigbee
using the identity of nodes in their
method of ke
y establishm
ent. The goal
is to use
the
s
e ide
n
tities to create a si
ngle shared
key
betwe
en ea
ch
pai
r of
no
d
e
s
i
n
a
n
e
two
r
k. Ho
weve
r, the
cre
a
tion o
f
the sha
r
ed
key
i
s
perfo
rmed
with inte
ra
ctions bet
wee
n
the two
nod
es. It me
an
s, method
s
re
quire
sendi
n
g
an
d
re
ceiving
multiple me
ssage
s on
both
side
s b
e
fore t
he
cre
a
ti
on of
the key. To
save po
we
r no
des that want
to sh
are
a
secret an
d th
ose
intermed
iate no
de
s,
several m
e
th
ods have
be
en p
r
op
osed
to
remove the
s
e intera
ction
s
. These meth
ods a
r
e k
n
o
w
n in the field of cryptography as the ID-
NIKDS [23] (Identity-Based
Non-Inte
ra
cti
v
e Key Distri
bution Sch
e
m
e
).
3.3.4. C4W
Jing
et
al. [24
]
pro
p
o
s
ed
a
method
calle
d
C4W
b
a
sed
on the use of the identity o
f
nodes
to cal
c
ul
ate p
ublic keys. T
he n
ode
s the
m
selve
s
a
r
e
able to
calcul
ate the
publi
c
keys of oth
e
r
node
s u
s
in
g their id
entities. What
could
repla
c
e th
e role of a
ce
rtificate. Before
deployme
nt, the
node
s
and
th
e ba
se
statio
n a
r
e l
oade
d
with thei
r
ow
n keys
(p
rivate / pu
blic key ECC)
and
pu
bli
c
informatio
n o
n
the network nod
es. Th
e
C4W m
e
tho
d
use
s
the p
r
inci
ple of Dif
f
ie-Hell
m
an
key
excha
nge to
cre
a
te a sin
g
l
e
sha
r
ed
key bet
we
en two
node
s with
ou
t using certificates
3.4. Sy
nthesis
We have
stu
d
ied differe
nt types of distri
bution an
d
key establi
s
hment in WSN. The
diagram
s SPINS and
LEAP use m
a
ster keys i
n
the
key establi
s
hm
ent. This
reduces the
storage
of key
s
in
th
e mem
o
ry
of
the no
de
s. Howeve
r, th
e
resi
stan
ce to
attacks i
s
l
o
w. Given that
the
maste
r
key can be
comp
romise
d at a
n
y
time, the keys e
s
tabli
s
h
ed after the
deployme
nt
by
usin
g thi
s
ke
y can
be
co
mpromi
se
d al
so. By ad
opti
ng a
symm
etric
syste
m
, th
ey are
the
m
o
st
suitabl
e and
among the m
o
st rapi
d in terms of calcul
ation. Note th
at the symme
tric diag
ram
s
are
co
stly in ope
rations
(if they exist) of ren
e
wal
and
rev
o
catio
n
of ke
ys sin
c
e th
ey use
se
cret keys
in ord
e
r to e
x
chan
ge oth
e
r secret keys. The p
r
obl
em is si
mple
r in the a
s
ymmetric
diag
ram
s
sin
c
e the pu
b
lic key
s
do no
t need to be secret.
The sch
e
me
Cha
n
et al., Rep
r
e
s
entin
g
prob
abili
stic
diagram
s sh
o
w
s th
at con
s
umes l
o
w
power and
d
o
not
re
quire
mu
ch
co
mp
uting
cap
a
cit
y
. However, l
a
rge
sizes ke
y ring
s
sto
r
e
d
in
the memo
ry node
s befo
r
e depl
oyme
nt make
s th
is sche
me
one of the most expen
sive
symmetri
c
al schem
es in terms of memo
ry occu
pati
on.
It cannot resi
st to attacks of type physical
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 2, May 2016 : 431 –
451
438
node
s
captu
r
es. While PIKE scheme
provides
better
con
n
e
c
tivity betwee
n
net
work nod
es, b
u
t
it
shows low performance in term of scalability.
We
can
se
e that the sch
e
m
a TinyPBC
is the m
o
st
suitable of a
s
y
mmetric patte
rns. It is
resi
stant
to m
o
st
kno
w
n
att
a
cks in
the
RCSF. Th
e
fact o
f
us
in
g th
e
c
o
up
lin
g in
o
r
d
e
r
to
es
ta
b
l
is
h
a uniqu
e key
sha
r
ed
betwe
en two no
de
s has h
e
lped
redu
ce the ne
ed for la
rge
storage
ca
pa
city
in memo
ry. In additio
n
, th
e creatio
n of
this
key i
s
p
e
rform
ed
wit
hout inte
ra
ction bet
wee
n
t
h
e
node
s,
whi
c
h
save
s th
e ti
me of
cal
c
ula
t
ion, and
the
energy con
s
u
m
ed
due
to t
hese inte
ra
ctions.
The di
ag
ram
s
u
s
in
g the
prin
cipl
e of
ce
rtific
ate
s
and PKI
re
main the
m
o
st exp
e
n
s
ive in
cal
c
ulatio
n an
d in ene
rgy
consumption.
The
comp
ari
s
on bet
ween t
he dia
g
ram
s
symmetri
c
al
and
asymmet
r
ical
may differ
d
epen
ding
on
the de
sired l
e
vel of securi
ty in the net
work.
We
not
e in
the table of
compa
r
ison th
at the symm
e
t
ric di
agrams can be cho
s
e
n
for
thei
r
tim
e
line
ss and
t
h
e
asymmet
r
ic d
i
agra
m
s for th
eir re
si
stan
ce
again
s
t attacks.
4.
LEAP
Enh
a
nced
In the p
r
evio
us
ch
apters, i
t
has be
en t
r
i
ed to
give
a
gene
ral de
scription
of so
m
e
of
the
state of the art algo
rithm
s
availabl
e in the liter
ature
.
It can be concl
ude
d that sen
s
or n
e
twork
node
s are mostly deplo
y
ed in una
ttende
d adversari
al enviro
n
ment
for e
x
ample battlefield.
Therefore, it is extremely importa
nt for the
applicati
ons of many
sensor net
works to have
a
se
curity m
e
chani
sm,
whi
c
h p
r
ovide
au
thenticatio
n
and
co
nfiden
tiality. The u
n
ique
issu
e t
hat
need
s to b
e
consi
dered in
sen
s
o
r
n
e
two
r
k
before
se
le
cting a
key sharin
g ap
pro
a
ch i
s
it
s imp
a
ct
on the
effe
ctiveness
of in
-network
pro
c
e
ssi
ng.
T
h
e
propo
se
d al
gorithm
supp
ort in
-net
wo
rk
pro
c
e
ssi
ng a
nd provid
e secu
rity prope
rties si
m
ilar t
o
those p
r
ovi
ded by pairwise key sha
r
i
n
g
scheme
s
. Similar to leap
+ and oth
e
r proto
c
ol the
propo
se
d solution is al
so based on
the
observation t
hat different types of me
ssage
s exch
an
ged bet
wee
n
sen
s
or
node
s have different
se
curity re
qui
reme
nts, whi
c
h lea
d
us to
the co
n
c
lu
si
on that a sin
g
le keyin
g
m
e
ch
ani
sm is
not
suitabl
e for
meeting the
s
e different
se
curity r
equi
re
ments. Li
ke l
eap
+ the p
r
o
posed al
gorit
hm
sup
port the e
s
tabli
s
hme
n
t of four differe
nt types of ke
ys:
Indiv
i
dual ke
y
:
Shared
wi
th
t
h
e
b
a
s
e
station
Pair
w
i
se ke
y
:
Shared wi
t
h
another
se
n
s
o
r
node
Cluster key
:
With
multiple
neighboring n
odes
i
t
i
s
s
har
e
d
Global ke
y
:
Shared b
y
a
ll nodes
in
the
network
4.1.
Assump
tion In
-
T
e
r
m o
f
N
e
t
w
ork
an
d
Securit
y
The
f
o
l
l
o
w
i
n
g
important
a
s
sumptio
n
has
been
mad
e
w
h
i
l
e
studying and d
e
s
i
g
n
i
n
g
the
protocol
A
s
t
a
t
i
c
s
e
n
s
o
r
n
e
t
w
o
r
k
w
h
e
r
e
nodes
a
r
e
not
mobil
e
The
ba
se station
work a
s
a
controlle
r
T
h
e
p
o
w
e
r
supplied
to t
h
e
base s
t
a
t
i
o
n
i
s
supplied
with long-la
stin
g
p
o
w
e
r
All nodes a
r
e
equal in
com
putational a
n
d
communication capabilities
Every
node
h
a
s
enough s
p
a
c
e
t
o
s
t
o
r
e
hundred
o
f
bytes
of
k
e
y
i
n
g
materials
N
o
d
e
s
i
n
s
t
a
l
la
t
i
o
n
c
a
n
b
e
done
b
o
t
h
e
i
t
h
e
r
t
h
r
o
u
g
h
a
e
rial scatteri
n
g
physical
in
stallation.
I
n
a
d
v
a
n
c
e
T
h
e
i
m
m
e
d
i
a
t
e
neighboring
node
s of
an
y
senso
r
nod
e
are n
o
t
k
n
o
w
n
All
the information
a nod
e hold
s
be
com
e
s
k
n
o
w
n
to the
attack
er
If
it is
c
o
mpromis
e
d
Attacks
of
the physical l
a
y
e
r
and
media
acce
ss
co
ntrol layer
are
not
con
s
ide
r
ed
4.2. Ket Ma
n
a
gemen
t
4.2.1. Indiv
i
d
u
al Ke
y
To
h
a
v
e
secure
co
mmuni
cation
bet
we
en
the n
ode
and
the
bas
e
s
t
a
t
io
n th
is
k
e
y
is
use
d
. Every node
in
th
e
n
e
twork
h
a
v
e
its o
w
n
indivi
dual k
e
y
.
I
n
d
i
v
i
dual k
e
y
i
s
a
l
s
o
i
m
p
o
r
t
a
n
t
i
n
the
se
nse
that
i
t
can
be
u
s
e
d
t
o
comp
u
t
e
the me
ssa
g
e
a
u
thenti
c
a
t
ion
code
if t
h
e
messag
e
is
t
o
be v
e
r
i
f
i
e
d
by
the
base
station. This
can b
e
also
used
t
o
s
e
n
d
alert
to the base
station if
there i
s
any
abno
rmal
be
havior o
b
s
e
r
v
e
d
.
Base
station can
u
s
e
i
ndividual key
to
encrypt any
sensitive
info
rmation
s
u
c
h
as keying
material
or speci
a
l in
stru
ctions
t
o
individual n
ode.
It
is
i
m
p
o
r
t
a
n
t
t
o
mention th
at
individual
k
e
y
i
s
p
r
e
l
o
a
d
e
d
into
t
h
e
n
e
twork b
e
f
o
r
e
deploymen
t
[
6
]
.
The
individ
u
a
l key
is
gene
rated
a
s
f
o
l
l
o
w
s
:
IKu =
fK
m
(u)
(1)
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
A Lightweig
ht Sym
m
e
tric Crypto
graph
y
Schem
e for Identifyin
g
…
(Yassi
ne Mal
e
h)
439
W
h
er
e
IKu
is the
individual k
e
y
,
f
is a
pseu
do-ra
nd
om
func
tion,
Km
is the
master k
e
y
,
and
u
is any node
f
o
r
which
w
e
w
a
n
t
to f
i
n
d
individual
k
e
y
.
4.2.2. Pair
w
i
se Key
s
Establishment
The mo
st
important step
i
s
t
o
have pairwi
s
e key
bet
wee
n
nod
es.
It
is
very
important
f
r
o
m
the
security point
of
v
i
e
w
as
if
t
he
key
is co
mpr
o
mise
d
it
s
ef
f
e
ct
is lo
cali
ze
d.
The p
a
i
r
w
i
s
e
key i
s
sh
ared
bet
wee
n
one-h
op
n
e
i
ghbors. A
s
e
n
s
o
r
no
de
communi
cat
e
s w
i
t
h
it
s
immediate
n
e
ighb
or throu
gh pairwi
s
e
k
e
y
.
The
imp
o
rtant a
s
sum
p
tion ma
de
t
o
esta
blish
p
a
ir
wis
e
key
s
a
r
e:
Nod
e
doe
sn
't kno
w
it
s nei
ghbo
r pai
rwi
s
e key b
e
fore
depl
oyment. Pairwi
se
ke
y
is
create
d
after
depl
oyment
T
h
e
nodes
o
f
the
network
a
r
e
s
t
a
t
i
o
n
a
r
y
node
s
A node
that
is
add
ed
t
o
t
h
e
network
w
ill d
i
s
c
o
v
e
r
mo
st
of its neighb
ors
at
t
h
e
t
i
m
e
of
deploymen
t
.
The pai
rwi
s
e
i
s
gen
erated
by following th
ese
step
s:
4.2.2.1 Ke
y
Predistribu
t
io
n
An
initial
ke
y
gene
rated
b
y
the controller is loa
d
ed to ea
ch
node. Ea
ch
n
ode then
derive its
ma
ster
key
as:
Ku =
fKin (u)
(2)
Whe
r
e
Ku
i
s
the
ma
ster ke
y
gene
rated
b
y
the
nod
e
u
,
f
is a
p
s
e
udo
-ra
ndom fun
c
tion,
Kin
is
the
initial k
e
y
,
and
u
i
s
any
node for
w
h
i
c
h
w
e
w
a
n
t
to
de
rive the
ma
ster
k
e
y
.
4.2.2.2 Neigh
bor Discov
e
ry
Every node tr
y
to
find
its neighb
or b
y
bro
a
d
c
a
s
tin
g
a
HELL
O
message. This Hello
messag
e
co
ntains
id of
the
n
ode. Also a
timer
is
s
t
arted
which
fires
after time Tmin. This
node
then
wait for
any
n
ode
v whi
c
h
respon
d tho
this
HE
LLO with a
n
a
c
k messag
e
hav
ing
the id of
the
node v. Ack
from
neigh
bo
r is
authenti
c
ated u
s
ing
m
a
ster key
kv.
The m
a
ste
r
key
is derived
as:
Kv
=
fKin (v)
(3)
W
h
er
e
Kv
is the
ma
ster key of
node
v
, f
is
a
pse
udo-ra
ndom
function,
ki
n
is the
initial
key,
and
v
is any
node
that
wa
nts
to
f
i
nd it
s
mast
e
r
key
.
4.2.2.3. Pairw
i
s
e
Key
Establishment
An
y
two
n
ode
s be
tween
the
ne
twork
le
t s
a
y nod
e
u
an
d
v compu
t
e
the p
a
irwis
e
k
e
y as
:
K
u
v
= f
K
v (
u
)
(4)
Where
kuv
is the pa
irwise
key be
tween
node
u
and
v
,
f
is a pseud
o-random
fun
c
tio
n
,
kv
is
th
e
master
ke
y o
f
node
,
and
u
is
the
nod
e
id
o
f
an
y nod
e
u
.
4.2.2.4. Ke
y
Erasure
When the
timer exp
i
res
after Tmin
, n
ode
u
erases
Kin
and a
ll
the mas
t
er k
e
ys o
f
its
neighb
or, wh
ich was
comp
uted
d
u
ring
th
e ne
ighb
or
dis
c
over
y phase
.
4.2.3. Cluste
r Ke
y
s
Establishment
Clu
s
ter key
i
s
e
s
tabli
s
h
e
d
between a n
ode an
d
all its
nei
ghb
ors. Usi
ng clu
s
ter
k
e
y
a
node e
n
cryp
t broad
ca
st
messag
e.
To
esta
blish th
e
clu
s
te
r k
e
y
any
node
u
gen
erate
a
rand
om
key and
then
en
crypt
this ran
d
o
m key
w
i
t
h
the
pai
rwise
key already gene
rated.
T
hen
t
h
e
generate
d
c
l
u
s
t
e
r
key
is transmitte
d
t
o
each
neighbo
rs.
4.2.4. Global Ke
y
Establishment
A key sh
ared
by the ba
se
station a
nd e
v
ery
node i
s
t
he glo
bal key. It is importa
nt and i
s
use
d
wh
en th
e base statio
n (co
n
troll
e
r) w
ant to gen
erate a confid
e
n
tial messag
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 2, May 2016 : 431 –
451
440
4.3. The Proposed Mod
e
ls for Identi
f
y
ing Compro
mised Node
The criti
c
al
a
s
sumption
th
at
leap+
h
a
s
con
s
id
ere
d
is that
within
T
m
in a
node cannot
be
compromi
sed. This
i
dea
s
e
e
m
s
pra
c
tical but
only
i
n
an
extrem
e
ide
a
l con
d
i
tion.
There is
possibility
th
at Tmin
w
o
u
l
d
in
re
ality
b
e
g
r
e
a
t
e
r
than the
one
a
s
sumed.
A
s
an example
if
node
s a
r
e
d
r
oppe
d and
s
c
a
t
t
e
r
e
d
from
airplan
e
s,
th
e
scattered
node
s m
a
y
a
rrive i
n
different
parts
of the
n
e
t
w
o
r
k
at di
fferent time
s
even
if
d
r
o
p
p
e
d
simultan
eou
sly and
h
ence
will
n
e
e
d
s
o
m
e
time to s
e
tup t
h
e
n
e
twork an
d e
x
chan
ge
pai
rwise
k
e
y
.
Taking t
h
e
adva
n
tage
of
t
h
i
s
an
adversa
ry
ma
y observe
a
node an
d
o
b
tains
the
key and
if the
gl
obal k
e
y
is compromised,
the
w
h
o
l
e
network
be
com
e
s at
risk. Sin
c
e th
is i
s
a
very
se
riou
s th
reat to
se
cu
rity different al
go
rithm
s
has b
een
stu
d
ied an
d pro
posed a mo
d
e
l that det
ect
the com
p
ro
mi
sed n
ode a
n
d
take ne
ce
ssary
action to
del
ete the comp
romi
sed
nod
e from the
n
e
tw
ork [25] [
26] [27] [28] [29]. Some o
f
the
algorith
m
s av
ailable in literature to dete
c
t compromise
node
s are:
Dete
cting Co
mpromi
se
d Node
s in Wi
rel
e
ss Se
n
s
o
r
Network by
Rick M
c
ken
z
i
e
, Min so
ng,
Mary
Mat
h
e
w
s,
sa
chin
shet
t
y
,
A Frame
w
o
r
k for identifying Com
p
ro
mised No
de
s in
sen
s
o
r
Network
by Qing
Zhang, Tin
g
Yu, Peng Nin
g
Malicio
us No
de
Dete
ction in
wirele
ss se
nso
r
Ne
two
r
ks usi
ng by Idris M.Atakli, Hongbi
ng Hu,
Yu chen
Senso
r
Node
Comp
romi
se
Dete
ction, Th
e locatio
n
Perspe
ctive by Hui son
g
and li
ang xie
4.3.1. 1
st
Proposed Mod
e
l for Identify
ing Compro
mised Node
A time call
ed
Tp h
a
s
bee
n
cho
s
e
n
a
nd
run it ite
r
ative
l
y after a
ce
rtain pe
rio
d
of
time to
che
c
k if the
r
e is any
no
de
com
p
ro
mised. It
ca
n
be
run
directly after pai
rwise
keys a
r
e
excha
nge
d a
nd the nod
es start co
mmu
nicatio
n
so t
hat to be su
re, that none
of the node i
s
comp
romi
se
d
and the
net
work
ha
s succe
ssfully ex
chang
ed all th
e key
s
se
curely. The ste
p
s
to
do the tasks
woul
d be [30]
.
Step 1: Perio
d
ic check
fo
r node detec
t
ion
An iterative-p
e
riodi
c PERI
O
DIC-CHE
C
K (T
p) ro
utin
e has be
en run on every
node to
che
c
k if it is unde
r atta
ck o
r
not. Du
ration
of
"Tp
"
is the trad
eoff of the "Compl
exity" and
"Attacke
r Threat". In the forme
r
case Tp co
uld
be
increa
sed t
o
so a
s
to
minimize ove
r
all
netwo
rk com
p
lexity in terms of
pa
cket
excha
nge. In
the later case
, Attacke
r T
h
reat, Tp
coul
d
be
minimized to have more freque
nt che
cks on Node
co
mpen
sation.
No
w su
ppo
se
a node i
s
co
mpromi
se
d e
x
actly after the CHECK pe
riod just fini
sh
ed, that
is "Tp+t" In this ca
se rather than to wait fo
r the next period (t
=2Tp
s
uppo
se
), the node itself se
nd
a Hel
p
b
r
oad
ca
st me
ssag
e. The b
a
se
station
re
ceive the hel
p b
r
oad
ca
st me
ssag
e an
d take the
necessa
ry action explai
ne
d in the next step.
Step 2: Sus
p
ension of
th
e compromised node
Upo
n
Re
cepti
on of the HELP from the node
un
de
r attack, the Base Station broad
ca
sts
an ALE
R
T m
e
ssag
e. The
alert m
e
ssa
g
e
contain
s
id
of the
sen
d
e
r of th
e
HELP (i.e the
n
ode
unde
r attack,
which ha
s b
een na
med
as "in_
dan
ge
r_id").
Nod
e
s receiving AL
ERT me
ssag
e,
insp
ect
s
for
the "in_dan
g
e
r_id" a
nd then compa
r
e
s
with the t
he list of IDs present in
its
NEIGHBO
R
LIST. If a ma
tch i
s
th
ere,
node
del
et
es the
pairwi
s
e
key
already
establi
s
h
ed
with
that node. If no-m
a
tch i
s
found, no
de j
u
st ke
ep
s th
i
s
id for a
sp
ecified a
m
ou
nt of time, and
w
h
en
e
v
e
r
in
itia
te
s
PAIR
-
W
I
SE k
e
y exc
h
a
n
g
e
pr
oc
es
s
,
c
o
mpar
e
s
th
is
k
e
y in
o
r
de
r
not
t
o
establi
s
h
any
pai
r-wise
ke
y with
a n
o
d
e
that i
s
i
n
fe
cted. In
Figu
re 5,
we
p
r
esent the
propo
sed
model for the
detectio
n
of compromised
node.
Evaluation Warning : The document was created with Spire.PDF for Python.