International conference on Computer Science and Information Systems (ICSIS’2014) Oct 17-18, 2014 Dubai (UAE)
Employing Chaotic Encryption for IEEE 802.15.4-based LR-WPANs Cuneyt Bayilmis, Unal Cavusoglu, Akif Akgul, Abdullah Sevin, and Sezgin Kacar
Examples of security protocols are given Tinysec [3], Sensec[4], Minisec[5], Fsmac [6], Spins[7], WSNSec[8]. On the other hand, examples of encryption algorithms are given Skipjack [9], AES[10], SEA[11]. Tinysec protocol is robust against to repetition attacks. It is provide that access control, data integrity and privacy. Tinysec uses a public key to ensure security. Tinysec provide low energy consumption and memory usage. Sensec is link layer protocol that is similar to Tinysec. Sensec protocol increasing safety and reducing power consumption has some improvements. Due to multi-switched mechanism, it has been made more resistant against to different attacks. Sensec is an efficient protocol against brute force attack and repeat attack. Minisec, is powerful against to repetition attacks. OCB (offset codebook) uses the block cipher method. Fsmac, is the protocol that used for DoS attacks. By adding intrusion detection and defense techniques on CSMA / CA protocol, is formed. Each node has its own mechanism to defend. There is a scattered defense mechanism. Spins protocol is composed of two secure building block as called mTesla and SNEP. Spins protocol is strong against repetition and eavesdropping attacks. Data confidentiality, integrity provide. Nowadays chaotic encryption is also used for WSNs. Chaotic systems are very limited studies conducted using encryption for WSNs. Shuai and Xia-xin have developed discrete chaos system and Feistel structure using a new block encryption algorithm [12]. Liu and colleagues developed a new method for chaotic encryption algorithm. This method has been compared with the performance of RC5-RC6 algorithms and developed chaotic system shows more effective results [13]. Fang et al; widely used in the literature for a cryptographic application with chaotic systems realized for WSN. The methodology developed has been shown to provide security with less cost [14]. In this study, employing chaotic encryption for IEEE 802.15.4 based LR-WPAN is proposed and its implementation has been realized using OPNET Modeler software. Also, performance evaluation carry out according to end-to-end delay and energy consumption. The remainder of the paper is organized as follows. Section 2 deals with IEEE 802.15.4. Section 3 details the chaotic encryption based security mechanism. In Section 4 simulation results from presented system are provided, followed by final remarks in the last section.
Abstract—Low-Rate Wireless Personal Area Networks (LRWPANs) have widespread usage for industrial applications because of being small, power-efficient, and low-cost. Therefore security is important issue for LR-WPANs. The IEEE 802.15.4 standard is one of the most common solution for LR-WPANs that defines only the physical and data-link layers of the OSI model. For this reason most of security issues are ignored owing to scope of this standard. Hence, security mechanisms should be implemented in the applications. This paper presents using chaotic-based encryption in the IEEE 802.15.4 standard to secure communication. In addition, modelling and simulation of the proposed structure have been realized using OPNET Modeler.
Keywords—Security, Chaotic, IEEE 802.15.4, R-WPANs. I. INTRODUCTION
S
ECURITY is an important research topic in Low-Rate Wireless Personal Area Networks (LR-WPAN). If security is not provided, the data can be found out and operation of the network can be prevented. There are many security protocols and encryption algorithms to ensure data security in LRWPANs. Security protocols and encryption algorithms contain powerful mathematical operations generally thus increasing energy consumption. Because of LR-WPANs have limited hardware resources such as amount of memory, storage space, area code etc. therefore, the resource usage in the design of security protocol must be considered. Using these limited resources has to perform the procedures [1, 2]. Security issue deals with security protocols and encryption algorithms in LR-WPAN. A number of security protocol and encryption methods for reliable data transfer in low-rate wireless personal area networks have been developed. Cuneyt Bayilmis, was with Department of Electronics and Computer Education, Technical Education Faculty, Kocaeli University, Kocaeli – Turkey. He is now with the Department of Computer Engineering, Faculty of Technology, Sakarya University, Sakarya, Turkey (corresponding author’s phone: +902642956483 ; e-mail:
[email protected]). Unal Cavusoglu, was with Department of Computer Engineering, Faculty of Technology, Sakarya University, Sakarya, Turkey (e-mail:
[email protected]). Akif Akgul is with the Department of Electrical-Electronics Engineering, Faculty of Technology, Sakarya University, Sakarya, Turkey (e-mail:
[email protected]). Abdullah Sevin is with the Department of Computer Engineering, Faculty of Technology, Sakarya University, Sakarya, Turkey (e-mail:
[email protected]). Sezgin Kacar is with the Department of Electrical-Electronics Engineering, Faculty of Technology, Sakarya University, Sakarya, Turkey (e-mail:
[email protected]).
http://dx.doi.org/10.15242/IIE.E1014023
II. IEEE 802.15.4 The IEEE 802.15.4 standard defines physical and MAC 89
International conference on Computer Science and Information Systems (ICSIS’2014) Oct 17-18, 2014 Dubai (UAE)
layer protocols of the Low-Rate Wireless Personal Area Networks that is the lower layers of OSI reference model. LR-WPANs have long battery life, low-cost, ease of installation, reliable data transfer and low-throughput features that communicates in short-range wirelessly [15]. There are three types of data rates at standard such as 250 kbps, 40 kbps, 20 kbps that can be operates in 2.4 GHz, 868 MHz and 915 MHz bands. 16 channels can be used in the 2.4 GHz ISM band, 10 channels in the 915 MHz band, and 1 channel in the 868 MHz band. The standard supports two addressing modes that are 16-bit short and 64-bit IEEE addressing and also two medium access mechanism which are CSMA-CA or ALOHA for contention-based access and TDMA for contention-free access [16]. These are some general features of the IEEE 802.15.4 standard and Figure 1 shows the superframe structure.
equations. In the developed system, The resolution of the encoded data have made it more complicated on account of the use of a non-linear equation, and performing the encryption producing a separate key for each bit of data. In this study, chaotic system was used to increase randomness in the generation of switches needed for coding. Chaos generators used in this coding is Logistic Map. Figure 2 exhibits bifurcation diagram of the Logistic Map. The value of r control parameter in the equation was 0-4. The r value must be between 3.5699 and 4 for the system to enter chaos. Xn+1= r * Xn * (1-Xn) (1) X value in Equation 1 is n value and the system variable is the number of repetitions. The system will produce as many switches for coding as the bytes of data to be used in the application.
Fig. 1 IEEE 802.15.4 superframe structure
There are two modes in the IEEE 802.15.4 standard: beacon-enabled and nonbeacon-enabled. In nonbeaconenabled mode, there is no synchronization within the network. Therefore only random access mechanism is active for medium access. In beacon-enabled mode, PAN coordinator transmits periodic beacons that contains information about the superframe structure [17]. After beacon, CSMA-CA or ALOHA mechanism is utilized in Contention Access Period (CAP) and TDMA mechanism in Contention Free Period (CFP). Guaranteed time slots (GTSs) are allocated to devices for access the channel with low-latency or specific data bandwidth [15]. During the inactive period (IP) nodes enter sleep mode for energy efficiency. Limited number of (only 7) slots and absence of priority mechanism are constraints of GTS allocations [18].
Fig 2 Bifurcation diagram of logistic map
IV. PERFORMANCE EVALUATION The example networking scenario and its simulation have been realized using the OPNET Modeler software [17]. We used Open-ZB (open-source toolset) [18] for the IEEE 802.15.4 protocol and implemented chaotic-based encryption mechanism on this model. The performance assessment was presented according to energy consumption and end-to-end delay metrics under various traffic loads. In addition, the used parameters are given in Table I. TABLE I SIMULATION PARAMETERS
III. CHAOTIC SYSTEM Recently, modern and strong cryptographic algorithms are predicted that can be solved a certain time. Concerning studies of encryption, some researchers emphasized that unlike standard encryption methods, between chaos and cryptography science is a strong relationship because of their special behavior of chaotic systems [19]. Chaotic systems have broadband, noise-like, difficult to predict and non-periodic feature. Chaotic signals, due to sensitive dependence on initial values and parameters [20], come to the fore in secure communication. Keys required for encryption are produced separately for each bit with chaos maps. Sending data be encrypted with this keys that generated for each bit separately, using a non-linear http://dx.doi.org/10.15242/IIE.E1014023
Parameter
Value
Data rate Number of SNs Frequency of nodes Transmission power Simulation time Traffic Area size
250 kbps 10 2.4 GHz 1 mW 3600 sec. Exponential 10m x 10m
We create the scenario using OPNET Modeler that includes 10 nodes, 1 coordinator and analyzer module that collects the statistical data for network scenario. Figure 3 shows the example application scenario that gives us to performance of presented system.
90
International conference on Computer Science and Information Systems (ICSIS’2014) Oct 17-18, 2014 Dubai (UAE)
Fig. 5 Consumed energy for node 1 during simulation time
V. CONCLUSION In the presented work, a chaotic-based encryption security mechanism implemented to the IEEE 802.15.4. We have evaluated the system performance in a simulation environment by using OPNET Modeler. End-to-end delay and consumed energy parameters are used to compare models. Most important outcome of the presented design is the results to be close to each chaotic-based encryption and non-encryption model.
Fig. 3 Simulation model of application using the OPNET modeler
Figure 4 shows the end-to-end delay for various rate of packet in chaotic-based encryption and non-encryption model. Average delay difference between models is 0,01618 ms approximately. Results are roughly equivalent for varied data rate as seen in Figure 4. As results, chaotic-based encryption model delay is reasonable.
ACKNOWLEDGMENT This research work was supported by the Ministry of Science, Industry and Technology of Turkey under the contract SANTEZ 0200.STZ.2013-1 and Research Fund of the Sakarya University, Project Number: 2013-09-10-001. REFERENCES [1]
[2]
[3]
Fig. 4 End-to-end delay between node1 and coordinator during simulation time
[4] [5]
Figure 5 illustrates the consumed energy for various rate of packet with chaotic-based encryption and non-encryption model. Average energy consumption of chaotic-based encryption model is 0,52344 joule more than non-encryption model. The energy consumption result from encryption process are acceptable for LR-WPANs constraints.
[6]
[7]
[8]
[9]
http://dx.doi.org/10.15242/IIE.E1014023
91
I. Demirkol, C. Ersoy, F. Alagoz, "Mac protocols for wireless sensor networks: a survey," IEEE Communications Magazine, v o l . 44 no. 4, pp. 115-121, 2006. http://dx.doi.org/10.1109/MCOM.2006.1632658 W. Ye, J. Heidemann , D. Estrin , "An Energy-Efficient MAC Protoco l for Wireless Sensor Networks," IEEE INFOCOM, New York, vol. 2, pp. 1567-1576, June 2002. D. Boyle, T. Newe "Securing Wireless Sensor Networks: Security Architectures", Journal of Networks, vol. 3, no. 1, January 2008 I. Krontms, T. Dirnitriou , H.Soroush, M. Salajeghe "WSN Link-layer Security Frameworks," Athens Information Technology, Greece M. Luk, G. Mezzour, A. Perrig, V. Gligor, "MiniSec: Secure Sensor Network Communication architecture", in Proc. of the 6th Int. Conf. on Information Processing in Sensor Networks, ACM Press, pp. 479-488, 2007 Q. Ren, Q. Liang, "Fuzzy Logic-Optimized Secure Media Access Control (FSMAC) Protocol for Wireless Sensor Networks," CIHSPS 2005 - IEEE Iutemational Conference on Computational Intelligence for Homeland Security and Personal Safety Orlando, FL, USA, 2005. A. Perrig , R. Szewczyk, V. Wen , D. Culler, J. D. Tygar "SPINS: Security Protocol s for Sensor Networks," Wireless Networks v o l . 8, pp. 521-534, 2002. http://dx.doi.org/10.1023/A:1016598314198 N. Bandirmali, I. Erturk, "WSNSec: A scalable data link layer security protocol for WNSs" Ad Hoc Networks vol. 10, pp. 37-45, 2012. http://dx.doi.org/10.1016/j.adhoc.2011.04.013 C. Karlof, N. Sastry, D. Wagner, "TinySec: a link layer security architecture for wireless sensor networks" in The 2nd ACM Conference on Embedded Networked Sensor Systems, U S A , p p . 162-175, 2004.
International conference on Computer Science and Information Systems (ICSIS’2014) Oct 17-18, 2014 Dubai (UAE)
[10] A. Samiah, A. Aziz, N. Ikram, "An efficient software implementation of AES-CCM for IEEE 802.11i wireless standard", in The 31st Annual International Computer Software and Applications Conference, China, pp. 689–694, 23–27 July 2007 [11] F.-X. Standaert, G. Piret, N. Gershenfeld, J.-J. Quisquater, "SEA: a scalable encryption algorithm for small embedded applications", Smart Card Research and Advanced Applications, vol. 3928, Springer LNCS, pp. 222–236, 2006. [12] S. Chen, X.X. Zhong, "Confidential communication through chaos encryption in wireless sensor network", Journal of China University of Mining and Technology, vol. 17, pp. 258-261, 2007. http://dx.doi.org/10.1016/S1006-1266(07)60084-4 [13] Y. Liu, S. Tian, W. Hu, C. Xing, "Design and statistical analysis of a new chaotic block cipher for Wireless Sensor Networks". Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 8, pp. 3267-3278, 2012. http://dx.doi.org/10.1016/j.cnsns.2011.11.040 [14] Q. Fang, Y. Liu, X. Zhao, "A chaos-based secure cluster protocol for wireless sensor networks", Kybernetika, vol. 44, no. 4, pp.522-533, 2008. [15] IEEE Std 802.15.4-2011, Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE, Sept. 2011. [16] IEEE 802.15 WPAN Task Group 4, http://www.ieee802.org/15/pub/TG4.html. [17] C. Li, L. Wang, J. Li, B. Zhen, H.-B. Li and R. Kohno, ",Scalable and robust medium access control protocol in wireless body area networks, ", in Indoor and Mobile Radio Communications, pp.2127–2131, Sept.2009. [18] H. Cao, S. Gonzalez Valenzuela and V. Leung, ",Employing ieee 802.15.4 for quality of service provisioning in wireless body area sensor networks", in Proc. of Advanced Information Networking and Applications, pp.902–909, Apr.2010. [19] J.M. Amigo, L. Kocarev, J. Szczepanski, "Theoryandpractice of chaoticcryptography", PhysicsLetters A, vol. 366, no. 3, pp: 211-216, 2007. [20] S. Lian, "Efficient image or video encryption based on spatiotemporal chaos system", Chaos, Solitons and Fractals, vol .40, no.5 pp: 25092519, 2009. [21] OPNET Modeler, Opnet Technologies Inc. [22] Open-ZB open-source toolset for the IEEE 802.15.4/ZigBee protocols web site. http://www.open-zb.net.
http://dx.doi.org/10.15242/IIE.E1014023
92