Download presentation
Presentation is loading. Please wait.
Published byPrudence Harris Modified over 8 years ago
1
Intrusion Detection-An Energy Efficient Approach In Heterogeneous WSN Department Of Computer Science and Engineering ADARSH COLLEGE OF ENGINEERING CHEBROLU (Affiliated to J.N.T.U., Kakinada) 08HN1A0534M. SRAVANI 08HN1A0537M. SUSHMA DEVI 08HN1A0516G. RAMYA 08HN1A0524K. SRI SARIKA UNDER THE GUIDANCE OF Mr. T. RAMANJANEYULU
2
Intrusion detection plays an important role in the area of security in WSN. WSN consumes a lot of energy to detect an intruder. Therefore we derive an algorithm for energy efficient external and internal intrusion detection.
3
Intrusion detection is defined as the art of detecting inappropriate, inaccurate, or anomalous activity. Today, intrusion detection is one of the high priority and challenging tasks for network administrators and security professionals.
4
A Wireless Sensor Network (WSN) is a collection of spatially deployed wireless sensors by which to monitor various changes of environmental conditions (e.g., forest fire, air pollutant concentration, and object moving) in a collaborative manner without relying on any underlying infrastructure support.
5
In a WSN, there are two ways to detect an object (i.e., an intruder): ◦ single-sensing detection ◦ multiple-sensing detection In the single-sensing detection, the intruder can be successfully detected by a single sensor. On the contrary, in the multiple-sensing detection, the intruder can only be detected by multiple collaborating sensors.
6
An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer mainly through a network, such as the Internet.
7
IDS Components SensorsConsoleEngine
8
The intrusion distance is referred as D and defined as the distance between the points the intruder enters the WSN, and the point the intruder is detected by the WSN system. The value of D must be minimum. D=Distance b/w the point at which intruder enters WSN and the point at which intruder is detected.
9
Existing System In single-sensing detection, at a time only one intruder detected by the WSN. Our Previous work was according to homogeneous and heterogeneous single sensor in wireless sensor network. Proposed System In Heterogeneous wireless sensor, Intruder detected anywhere in the network. We are detecting the intruder in multiple sensor heterogeneous wireless sensor networks.
10
Rec1 Source Detector Data Flow Rec 3 Rec 2 Intruder Heterogeneous single sensor
11
S2 Detec2 Detec3 B C S1 Detec1A Data Flow Intruder
13
HARDWARE Processor: Pentium IV 2.6 GHz RAM: 512 Mb Hard Disk: 20 Gb SOFTWARE Front End: Java Tool Used: JFrameBuilder Operating System: Window’s Xp
14
Constructing Network Security Randomized Field Detection Layered Approach For Intrusion Detection Find Authorized And Unauthorized Port Constructing Inter-domain Packet Filters Receiving The Valid Packet
15
CONSTRUCTING NETWORK SECURITY In this module, we are going to connect the network, each node is connected to the neighbouring node and it is independently deployed in network area. And also deploy the each port no that is authorized in a node. RANDOMIZED FIELD DETECTION In this module, browse and select the source file. And selected data is converted into fixed size of packets. And the packet is send from source to detector.
16
LAYERED APPROACH FOR INTRUSION DETECTION The LIDS draws its motivation from what we call as the Airport Security model, where a number of security checks are performed one after the other in a sequence. Similar to this model, the LIDS represents a sequential Layered Approach and is based on ensuring availability, confidentiality, and integrity of data and (or) services over a network.
17
FIND AUTHORIZED AND UNAUTHORIZED PORT If path is authorized the packet is send to valid destination. Otherwise the packet will be deleted. CONSTRUCTING INTER-DOMAIN PACKET FILTERS If the packet is received from other than the port no it will be filtered and discarded. This filter only removes the unauthorized packets and authorized packets send to destination.
18
RECEIVING THE VALID PACKET In this module, after filtering the invalid packets, all the valid Packets will reach the destination.
19
File Dialog Select The Source File Fixed Size of Packet Detector Source
21
Use-case Diagram:
22
Sequence Diagram For Module1
23
Sequence Diagram For Module2
24
Sequence Diagram For Module3
25
Sequence Diagram for Module4
26
Activity Diagram For Module1
27
Activity Diagram For Module2
28
Activity Diagram For Module3
29
Activity Diagram for Module4
30
We have developed an analytical model for intrusion detection and applied the same into single-sensing detection and multiple sensing detection scenarios for heterogeneous WSNs..
31
THANK YOU…
32
ANY SUGGESTIONS???
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.