SPINS-SPINS: Security Protocols for Sensor Networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5

Posts: 213
Joined: Dec 2009
29-12-2009, 06:45 PM

Wireless Sensor Networks

A wireless sensor network consists of large Number Of Nodes.Large number of heterogeneous Sensor devices spread over a large field.They perform Wireless sensing and Data Networking. Group of sensors linked by wireless media to perform distributed sensing tasks
Each node has three components: sensing, processing, and communication. Networked sensors can continue to operate accurately in face of failure of individual sensors.Each sensor node operates autonomously with no central point of control in the network. Each node bases its decision on its mission.

SPIN: Sensor Protocols for Information Negotiation

It is one of the most dominant form of routing in the wireless sensor networks.The SPIN protocol names the data using data descriptors or meta data.The nodes use meta data negotiations to eliminate transmission of redundant data in the network. SPIN nodes can base their communication decisions on knowledge of data and resources allowing them to distribute data given limited energy supply.

Advantages of SPIN
-SPIN nodes negotiate with each other before transmitting data. This ensures that only the useful information is transferred.
-SPIN uses descriptors called meta data
-Redundant data messages are not sent
-Nodes are able to name the portion of data they are interested in obtaining.

Resource adaptation
-The wireless sensor network nodes poll their resources before data transmission
-Each sensor node had its own resource manager that keeps track of resource consumption
-Nodes are aware of their local energy resources and this enables them to reduce their activities when their energy resources are low
-Nodes monitor and adapt to changes in their own energy resources and thus extend the operating lifetime of the system

SPINS: Security Protocols for Sensor Networks
With thousands to millions of small sensors form self-organizing wireless networks in the future, providing security for these sensor networks is a big issue.
SPINS has two secure building blocks: SNEP(Secure Network Encryption
Protocol) and microTESLA((the micro version of the Timed, Efficient, Streaming, Loss-tolerant Authentication Protocol). SNEP provides the following : Data confidentiality, two-party data authentication, and data freshness. microTESLA provides authenticated broadcast for severely resource-constrained environments.

This provides Data Confidentiality, Authentication, Integrity, and Freshness.
- it has low communication overhead as it adds only 8 bytes per message.The counter state is kept at each end point and does not need to be sent in each message.
-it uses a counter, but avoids transmitting the counter value by keeping state at both
end points.
- It achieves semantic security which prevents eavesdroppers from inferring the
message content from the encrypted message.
- This protocol also provides data authentication, replay protection, and weak message freshness.
To achieve two-party authentication and data integrity, a message authentication code (MAC) is used.
Data authentication: If the MAC(message authentication code) verifies correctly, a receiver
can be assured that the message originated from the claimed sender.

Replay protection: The counter value in the MAC prevents replaying old messages.

Semantic security: the same message is encrypted differently each time.

Weak freshness: If the message verified correctly, a receiver
knows that the message must have been sent after the previous
message it received correctly. Thus it achieves weak freshness.

microTESLA overcomes introduces asymmetry through a delayed disclosure of symmetric
keys, which results in an efficient broadcast authentication
scheme. It requires that the base station and nodes are loosely
time synchronized, and each node knows an upper bound on the
maximum synchronization error. To send an authenticated packet of data,
the base station computes a MAC on the packet with a key
that is secret at that particular point in time. When a node gets a packet, it can
verify that the corresponding MAC key was not yet disclosed by
the base station. Since a receiving node is assured that the MAC key
is known only by the base station, the receiving node is assured that the data was not modified during the sending process. If the key is correct, the node can
now use it to authenticate the packet stored in its buffer.

Full seminar and presentation report download:

.pdf   SPINS Security Protocols for Sensor Networks.pdf (Size: 395.26 KB / Downloads: 503)
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
computer science technology
Active In SP

Posts: 740
Joined: Jan 2010
17-01-2010, 11:23 PM

.ppt   SPINS Presentation.ppt (Size: 137 KB / Downloads: 267)
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
raju patel
Active In SP

Posts: 1
Joined: Aug 2010
17-08-2010, 11:55 AM

please send me detail of this seminar and presentation security protocol for sensor network
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
09-03-2011, 02:02 PM

Presented By :
Tanu Sharma

.ppt   015-SPINS.ppt (Size: 135 KB / Downloads: 100)
SPINS: Security Protocols for Sensor Networks
Sensor Networks are emerging
• Many applications
- Real-time traffic monitoring
- Military applications
- Emergency and critical systems etc.
Need secure communication protocols
• Security for Sensor Networks
• Data Authentication
• Data Confidentiality
• Data Integrity
• Data Freshness
- Weak Freshness
- Partial message ordering, no delay information
- Useful for sensor measurements
- Strong Freshness
- Total ordering on req-res pair, delay estimation
- Useful for time synchronization
Challenge: Resource Constraints
• Limited energy
• Limited computation(4MHz 8-bit)
• Limited memory(512 bytes)
• Limited code size(8 Kbytes)
• Limited communication(30 byte packets)
• Energy consuming communication
-Sensor Network Encryption Protocol
-Secures point-to-point communication
-Micro Timed Efficient Stream Loss-tolerant Authentication
-Provides broadcast authentication
System Assumptions
Communication patterns

-Node to base station (e.g. sensor readings)
-Base station to node (e.g. specific requests)
-Base station to all nodes
• Base Station
-Sufficient memory, power
-Shares secret key with each node
• Node
-Limited resources, limited trust
• Notation
• Data Confidentiality (Semantic Security )
• Data Authentication
• Replay Protection
• Weak Freshness
• Low Communication Overhead
Key Generation /Setup
• Nodes and base station share a master key pre-deployment
• Other keys are bootstrapped from the master key:
– Encryption key
– Message Authentication code key
– Random number generator key
• Authentication, Confidentiality
• Without encryption can have only authentication
• For encrypted messages, the counter is included in the MAC
• Base station keeps current counter for every node
• Strong Freshness
• Counter Exchange Protocol
• Bootstrapping counter values
• µTESLA : Authenticated Broadcast
• TESLA : efficient source authentication in multicast for wired networks.
Problems with TESLA
-Digital Signature for initial packet authentication
µTESLA uses only symmetric mechanism
-Overhead of 24 bytes per packet
µTESLA discloses key once per epoch
-One way key chain is too big
µTESLA restricts number of authenticated senders
Key Setup
• Main idea: One-way key chains
• K0 is initial commitment to chain
• Base station gives K0 to all nodes
• mTESLA Properties
• Asymmetry from delayed key disclosure
• Self-authenticating keys
• Requires loose time synchronization
• Low overhead (1 MAC)
- Communication (same as SNEP)
- Computation (~ 2 MAC computations)
• Independent of number of receivers
• Authenticated Routing
• Node to Node Agreement
A B: NA, A
B S: NA,NB, A, B, MAC(K’BS, NA || NB || A || B)
Related Work in Broadcast Authentication
• Symmetric schemes
- Link-state routing updates
- Multi-MAC
• Asymmetric schemes
- Merkle hash tree
• Chained hashes
• Hybrid schemes
-Stream signature
-K-times signature
Discussion: Drawbacks
• The mTESLA protocol lacks scalability
- require initial key commitment with each nodes, which is very communication intensive
• SPINS uses source routing, so vulnerable to traffic analysis
Discussion: Risks Un-addressed
• Information leakage through covert channels
• No mechanism to determine and deal with compromised nodes.
• Denial of service attacks
• No Non-repudiation
• Strong security protocols affordable
- First broadcast authentication
• Low security overhead
- Computation, memory, communication
• Apply to future sensor networks
-Energy limitations persist
-Tendency to use minimal hardware
• Base protocol for more sophisticated security services
seminar paper
Active In SP

Posts: 6,455
Joined: Feb 2012
15-02-2012, 01:59 PM

to get information about the topic SPINS- Security Protocol for Sensor Networks full report ,ppt and related topic refer the link bellow




Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: spins in computer networks, security protocols for sensor networks download, information about security protocol for sensor network project, information seminar about security protocol for sensor network, latest ppt of spins security protocol for sensor network, www ppt for security protocol in wireless sensor networks, security protocol for sensor network report,
Popular Searches: human area netwok, information on security protocols for sensor networks****green cellular networking seminar report, seurity protocol for sansor network with report, seminar topics computer networks, seminar on network management protocols, spin protocol matlab simulation free open source code, security protocols,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security using colors and Armstrong numbers Moiz ansari 2 148 21-10-2015, 12:10 PM
Last Post: mkaasees
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,221 16-07-2015, 09:21 PM
Last Post: Guest
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,413 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 268 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 268 13-02-2015, 02:01 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 275 17-01-2015, 04:13 PM
Last Post: jaseelati
  computational intelligence in wireless sensor networks ppt jaseelati 0 351 10-01-2015, 03:10 PM
Last Post: jaseelati
  MANETS: MOBILE ADHOC NETWORKS seminar projects crazy 2 1,963 11-06-2014, 09:44 AM
Last Post: seminar project topic
  Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks seminar ideas 11 3,912 02-04-2014, 12:50 PM
Last Post: Guest
  Bluetooth Based Smart Sensor Networks (Download Full Seminar Report) Computer Science Clay 91 68,783 04-03-2014, 12:46 AM
Last Post: nikhil goyal