A Test-bed for Secure Hierarchical Data Aggregation in Wireless Sensor Networks Students: Vimal Kumar, Joshua McCarville-Schueths (Computer Science Department ) Faculty Advisor: Dr. Sanjay Madria, Computer Science Department INTRODUCTION • • • • IMPLEMENTATION Wireless sensors are small battery powered devices with wide applications in areas such as battlefield surveillance, wildlife monitoring, healthcare, etc. Since the biggest reason of power consumption on sensors is wireless communication, we focus on minimizing it. The Platform used was nesC on Tinyos 1.1.15 MICA2 TELOSB • Code was implemented on Mica2 and TelosB motes. MPR400CB TI MSP430 • 8 bit Microcontroller 16 bit Microcontroller Used TinyECC library for Elliptic curves with160 bit curve secp160r1. This provides160-bit encryption keys. Program flash 128kB 48kB • RAM 4kB 10kB Clock Speed 7.3827 MHz 8 MHz Data is encrypted by Elliptic curve ELGamal (ECEG) and signed by our modified version of Elliptic curve digital signature algorithm (ECDSA). • ECEG is a homomorphic encryption scheme and the modified ECDSA is an aggregate digital signature scheme. Processor The challenge on wireless sensors is to devise algorithms which require least energy so as to make the sensors last longer. • Security operations are power intensive. In a secure protocol, such operations should be kept to a minimum while maintaining optimum security. Traditional Encryption Enc[Message1] + Enc[Message2] ≠Enc[Message1 + Message2] DATA AGGREGATION Base Station Base Station Intermediate nodes aggregate data Homomorphic Encryption Enc[Message1] + Enc[Message2] = Enc[Message1 + Message2] I see 6 soldiers Digital Signatures Sign[Message1] + Sign[Message2] ≠ Sign[Message1 + Message2] Additive Digital Signatures Sign[Message1] + Sign[Message2] = Sign[Message1 + Message2] MICA2 Operation Encryption Sign Addition of ciphertext Addition of signatures Keeping soldier count using data aggregation Time Taken (ms) 4406.207 2477.036 335.2 0.09 Addition of Public keys 157.67 Data aggregation helps conserving energy by reducing the number of messages sent with in the network. OBJECTIVES • • Develop a secure end to end data aggregation scheme with lesser power consumption. • Propose security operations(encryption, digital signatures) to support the end to end communication. • • • Write an efficient implementation of these security operations. Write a reconfigurable implementation which can be easily customized to fit various platforms and motes. Energy Consumed (mJ) 105.75 59.44 8.04 0.002 3.78 Time Taken (ms) 10573.63 5890 406.59 0.2 200 Energy Consumed (mJ) 57.09 31.80 2.19 .001 1.08 RESULTS • • The results obtained by the implementation of the code on Mica2 motes are summarized in the table above. The scheme replaces the decrypt, verify, encrypt and sign operations on the intermediate nodes, with the three operations , namely the addition of ciphertext, signatures and the public keys. Energy Saving at Aggregators • MICA2 • TELOSB - 100.39 mJ SUM-Enc(101) SUM-Sign(101) SUM-PK(21,17) TELOSB - 97.74 mJ The code for TELOSB is in the process of optimization. Its execution times and energy consumption can be further reduced. Children transmit the encrypted data , signature, and the public key to the parent Enc( 58) Sign(58) PK(21,19) Enc( 24) Sign(24) PK(13,11) Enc( 19) Sign(19) PK(11,10) FUTURE WORK Extend the network lifetime by further optimizing the code. Minimize the redundancy of the messages in the network by implementing data compression at the source nodes. • Implementation of the algorithm on GumStix ACKNOWLEDGEMENTS This research is partly supported by Intelligent Systems Center. REFERENCES Vimal Kumar, Joshua McCarville-Schueths and Sanjay Madria, “A Test-bed for Secure Hierarchical Aggregation in Wireless Sensor Networks, Demo paper in MASS 2010
© Copyright 2025 Paperzz