Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Dynamic Object Tracking in Wireless Sensor Networks Tzung-Shi Chen 1, Wen-Hwa Liao 2, Ming-De Huang 3, and Hua-Wen Tsai 4 1 National University of Tainan,
A Distributed Algorithm for the Dead End Problem of Location Based Routing in Sensor Networks Le Zou, Mi Lu, Zixiang Xiong, Department of Electrical Engineering,
CS710 IEEE Transactions on vehicular technology 2005 A Distributed Algorithm for the Dead End Problem of Location Based Routing in Sensor Networks Le Zou,
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
BY: TAUSEEF SHAH REG. NO. FA11-REE-049 SUPERVISOR DR. SAFDAR H. BOUK CO-SUPERVISOR DR. NADEEM JAVAID MVC: Modified VIKOR Model based Clustering Protocol.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Introduction to Wireless Sensor Networks
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
Impala: A Middleware System for Managing Autonomic, Parallel Sensor Systems Ting Liu and Margaret Martonosi Princeton University.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Wireless Sensor Network Security Anuj Nagar CS 590.
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
LPT for Data Aggregation in Wireless Sensor Networks Marc Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering, University of British.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Grammati Pantziou 1, Aristides Mpitziopoulos 2, Damianos Gavalas 2, Charalampos Konstantopoulos 3, and Basilis Mamalis 1 1 Department of Informatics, Technological.
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
VAPR: Void Aware Pressure Routing for Underwater Sensor Networks
Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing.
Collaborative Sampling in Wireless Sensor Networks Minglei Huang Yu Hen Hu 2010 IEEE Global Telecommunications Conference 1.
Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
2017/4/25 INDOOR LOCALIZATION SYSTEM USING RSSI MEASUREMENT OF WIRELESS SENSOR NETWORK BASED ON ZIGBEE STANDARD Authors:Masashi Sugano, Tomonori Kawazoe,
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National.
An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim, Dept. of Electrical & Electronic Eng., Yonsei University;
Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, Shojiro Nishio
Energy-Efficient Protocol for Cooperative Networks.
A Protocol for Tracking Mobile Targets using Sensor Networks H. Yang and B. Sikdar Department of Electrical, Computer and Systems Engineering Rensselaer.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
I-Hsin Liu1 Event-to-Sink Directed Clustering in Wireless Sensor Networks Alper Bereketli and Ozgur B. Akan Department of Electrical and Electronics Engineering.
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin 1 Pasd Putthapipat 1 Deng Pan 1 Niki Pissinou 1.
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks IEEE Transactions on Parallel and Distributed System, Vol. 19, No. 5, May 2008.
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
DETECTION OF WORMHOLE ATTACK IN MANET
ENERGY EFFICIENT TIME SYNCHRONIZATION PROTOCOL FOR MOBILE UNDERWATER ACOUSTIC SENSOR NETWORKS Under the Guidance of Submitted by Mr. P. Mukunthan, AP/CSE.
S URVIVABILITY A NALYSIS OF AD HOC NETWORK UNDER ATTACK Project Members S.Karthiga G.Asha J.Anusha Guided By Mrs. P.Prittopaul.
Efficient Route Update Protocol for Wireless Sensor Networks Xuhui Hu, Yong Liu, Myung J. Lee, Tarek N. Saadawi City University of New York, City College.
In the name of God.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks Name: Patrick Zwane University: National Taipei University of.
Introduction to Wireless Sensor Networks
Presentation transcript:

Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD Project Members: 1. U.Saranya 2. P.SriArthi 3. S.Sneha Supervisor: Dr.K.M.Anandkumar M.Tech. Ph.D Assistant Professor (Sl.Gr.) 04/05/20131Project Review

Objective To tackle mobile replica node attacks in WSNs and make the network free from replicas’ intrusion by: Detecting the presence of mobile replica nodes Isolating the replicas and retaining original nodes 04/05/2013 2Project Review

Motivation WSNs are vulnerable to attacks Mobility in sensor networks make it difficult to spot the malicious nodes in hostile environments Absence of a unique ID for sensors in WSN makes them susceptible to replica attacks 04/05/20133Project Review

Literature Survey (1) Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks using Sequential Hypothesis Testing, J.W.Ho, M.Wright, S.K.Das, IEEE Transactions, 2011 Techniques used: SPRT Hypothesis testing Quarantine analysis Performance Achieved: If v max =10 m/s, 80.6% detection for 5 to 9 claims If v max =100 m/s, 61.1% detection for 4 to 9 claims Drawback: Both compromised and replica nodes are revoked from the network 04/05/20134Project Review

04/05/20135 Distributed Detection of Replicas with Deployment Knowledge in WSN, J.Ho, D.Liu, M.Wright, Ad Hoc Networks, Nov 2009 Technique used: Group deployment strategy “Trusted” nodes close to Group Deployment Point Performance Achieved: Trade off depends on sensor deployment to group deployment point’s accuracy Drawback: Static Sensors Prior knowledge of group location, deployment time Literature Survey (2) Project Review

04/05/20136 Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks, C.-M. Yu, C.-S. Lu, S.-Y. Kuo, IEEE Conference Technique: Number of mobiles nodes encountered by mobile replicas in a time interval is more than the number encountered by a benign mobile node Performance Achieved: O(N 2 )-communication overhead O(N)-storage overhead Drawback: Replica can carefully control the number of encounters it has with the other nodes Literature Survey (3) Project Review

Issues in the Existing Systems Hypothesis based testing Centralized Approach SPRT revokes all nodes including the original Quarantine Analysis for replica isolation - energy consuming and complex - memory overhead 04/05/20137Project Review

Proposed System ORT (Origin and Route Tracking) method tracks location of original node Home sink reveals current location of original node to Base Station Replicas’ location identified; Replicas isolated Original node retained 04/05/20138Project Review Diagram

System Architecture 04/05/20139Project Review

Functional Architecture 04/05/201310Project Review

List of Modules Module 1: Introduction of Replica Module 2: Detection of Replica Module 3: Isolation of Replica 1104/05/2013 Project Review

Module1: Introduction Of Replica 04/05/ Parameters: BS- Base Station SinkS- Source Sink DB- Data base SinkD- Destination Sink PL- Pervious Location CL- Current Location Input: A network with N no of benign nodes. Output: Databases of sinks and BS updated after node movement Algorithm: 1. Node A broadcasts beacon message. 2. Each ‘Sink’ updates its DB about nodes within its range 3. Each sink sends this information to BS. 4. Node A moves from SinkS to SinkD. 5. SinkD receives the beacon of A. Project Review

Module1: Introduction Of Replica 6. SinkD updates arrival of A in its range in its database and replies to beacon of A. 7. A updates the CL and PL in its DB. 8. A broadcasts its PL. 9.SinkD updates A’s PL as SinkS and messages SinkS about A’s arrival. 10.SinkS checks inside its range for node A. 11. If found, go to step Else,SinkS sends the name of “ home sink” of node A. 13. SinkD updates its DB with “home sink” data of A and continues again from step 4. 04/05/ Descriptive Diagram Project Review Sequence Diagram

Module 2: Detection Of Replica Input: A network with N nodes with possibility of replica Output: Confirmation of replica’s presence Algorithm: 14. SinkS sends a message to BS about possibility of replica in the network. 15. BS checks its DB for home detail of A. 16. BS inquires “home sink” of A about its last destination. 17. “Home Sink” of A replies back to BS with the CL of A 18. BS forwards CL of A to SinkS 04/05/ Descriptive Diagram Project Review Sequence Diagram

Input: A network with N nodes containing M replicas Output: A network of N benign nodes Algorithm: 19. SinkS broadcasts the CL of A 20. Each Sink checks if A is within range 20. If yes, the sink drops A’s packets 15 Module 3:Isolation Of Replica Descriptive Diagram Project Review 04/05/2013 Sequence Diagram

System Requirements Simulator: OMNeT++/Mixim Processor: 3 GHz Intel Dual Core Memory: 4 GB Operating system: Microsoft Windows XP/ Windows 7(64-bit) Language Platform: C++ 16Project Review 04/05/2013

References 1. J.Ho, D.Liu, M.Wright, (2009), “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks”, International Journal of Ad Hoc Networks, Vol.7, No.8, pp: 1476 – C.-M. Yu, C.-S. Lu, S.-Y. Kuo, (2009), “Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks”, In the proceeding of IEEE Vehicular Technology Conference Fall, pp:1 – 5 3.J.W.Ho, M.Wright, S.K.Das, (2011), “Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks using Sequential Hypothesis Testing”, IEEE Transactions on Mobile Computing, Vol.10, No.6, pp: Project Review04/05/2013

Conclusion Overcome drawbacks of hypothesis testing Achieved high detection rate Interrupt free communication 04/05/2013Project Review18

Screenshots 04/05/2013Project Review19 Initial Network Setup

04/05/2013Project Review20 Initial Beacon Broadcast by Mobile Node

04/05/2013Project Review21 Beacon Response

04/05/2013Project Review22 Sink communication with BS for update

04/05/2013Project Review23 Update Response by BS

04/05/2013Project Review24 Response to Periodic Beacon by Mobile Node

04/05/2013Project Review25 New Sink’s Broadcast Response

04/05/2013Project Review26 Intimation of Node’s Arrival

04/05/2013Project Review27 Updating of Current Location by Node

04/05/2013Project Review28 Intimation of Node’s Previous and Current location

04/05/2013Project Review29 New Sink’s communication with Old Sink

04/05/2013Project Review30 Notification of Node’s Home Sink

04/05/2013Project Review31 Introduction of Replica

04/05/2013Project Review32 Updating of Current Location by Replica

04/05/2013Project Review33 Replica’s Behaviour as Original Node

04/05/2013Project Review34 Current Sink’s Communication with Previous Sink

04/05/2013Project Review35 Suspision of Replica’s Presence

04/05/2013Project Review36 Identification of Node’s Home Sink by BS

04/05/2013Project Review37 Identification of Original Node’s Current Location

04/05/2013Project Review38 Response to Suspicion

04/05/2013Project Review39 Broadcast of Original Node’s Current Location

04/05/2013Project Review40 Sink’s Realization of Node’s Actual Location

04/05/2013Project Review41 Replica’s Communication with Sink

04/05/2013Project Review42 Isolation of Replica

04/05/2013Project Review43 Network Initialization

04/05/2013Project Review44 Beacon Broadcast

04/05/2013Project Review45 Beacon Response

04/05/2013Project Review46 Introduction of Replica

04/05/2013Project Review47

04/05/2013Project Review48

04/05/2013Project Review49

04/05/2013Project Review50

04/05/2013Project Review51

04/05/2013Project Review52 Back To Algorithm

04/05/2013Project Review53 Detection of Replica

04/05/2013Project Review54

04/05/2013Project Review55

04/05/2013Project Review56

04/05/2013Project Review57

04/05/2013Project Review58 Back To Algorithm

04/05/2013Project Review59 Isolation of Replica Back To Algorithm Back To Proposed System

04/05/2013Project Review60 Sequence Diagram for Home Sink-BS Communication

04/05/2013Project Review61 Sequence Diagram for Node Movement Back to Algorithm

04/05/2013Project Review62 Sequence Diagram for Detection of Replica Back to Algorithm

04/05/2013Project Review63 Sequence Diagram for Detection of Replica Back to Algorithm