Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fixing the replicated Nodes in mobile Sensor Networks GUIDED BY Mr. N.SHIVA KUMAR Presented by K.Sumathy (08c117) C.Bindu Prasad (08c19)

Similar presentations


Presentation on theme: "Fixing the replicated Nodes in mobile Sensor Networks GUIDED BY Mr. N.SHIVA KUMAR Presented by K.Sumathy (08c117) C.Bindu Prasad (08c19)"— Presentation transcript:

1 Fixing the replicated Nodes in mobile Sensor Networks GUIDED BY Mr. N.SHIVA KUMAR Presented by K.Sumathy (08c117) C.Bindu Prasad (08c19)

2 INTRODUCTION : Computer Networks is a collection of nodes interconnected by communication channels like physical connection through cables (wired network) or through air medium (wireless network) which facilitate resource and information sharing. Wireless network is said to be Ad hoc because it doesn’t depend on the pre-existing infrastructure and each node plays a role of router and forwards the packet. Mobile Ad hoc network has mobile nodes and changes its links frequently

3 ATTACKS IN MOBILE ADHOC NETWORKS  Wireless Networks are often unattended and hence prone to several kind of novel attacks  The mission-critical nature of sensor network applications implies that any compromise or loss of sensory resource due to a malicious attack launched by the adversary-class can cause significant damage to the entire network.

4 ATTACKS IN MOBILE ADHOC NETWORK These attacks are severely vulnerable and have been classified as Active Attacks An active attack involves information interruption, modification, or fabrication, thereby disrupting the normal functionality of a MANET. Passive Attacks A passive attack obtains data exchanged in the network without disrupting the operations of communication.

5 REPLICATION NODE ATTACK Replication node attack is one in which one or more nodes legitimately claim an identity of legitimate node and replicated in whole wireless networks Reason for choosing this attack is that it can form the basis of a variety attacks such as routing attacks and link layer attacks etc. also called as denial of service attacks which affects availability of network.

6 Problem Statement To find out an simple and efficient procedure that will fix the replicated nodes which initiates the replicated node attacks in which adversary takes the secret keying materials from a compromised node in the wireless environment.

7 MODULES Creating a Wireless Environment Finding the location of each and every nodes at different time intervals Implementation of speed calculation for each and every node. Fixing the replicated nodes.

8 Creating Wireless Environment Wireless Environment is created by network simulator instance, Trace file, NAM file. We create 22 mobile nodes using tcl script. Nodes move within a fixed rectangular area of 500x500. We create packet forwarding between two nodes using TCP with the help of an agent. By setting the time we can end the simulation by calling stop procedure.

9 IMPLEMENTATION PROCEDURE Initially position of each node is calculated by modifying the AODV::forward() method. From the position of the node we can calculate the distance for each node. From the distance we can calculate the speed of each and every node at different time intervals. If the speed of the node is found to be greater than that of the fixed threshold value they will be identified as replicated nodes

10 RESULTS Snapshot depicting the start of the simulation

11 RESULTS Snapshot depicting the wireless environment at the end of the simulation.

12 RESULT AND ANALYSIS Snapshot depicting the position and velocity of each node

13 CONCLUSION This project is done to fix the “replicated nodes” in the mobile sensor networks by calculating the speed of each and every nodes and thereby finding the nodes which have their speeds greater than the predefined maximum speed value. The results and analysis of the project depicts the faster detection of the replicated nodes. The simulation done using ns2 has proved that the proposed scheme has achieved its goal.

14 FUTURE WORK In future we would like to evaluate our scheme against various types of attacker models. In particular, we are interested in exploring how a variety of attacker models impact on the security of the proposed scheme.

15 REFERENCE:  Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks,” Florida Atlantic University  Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo “Mobile Sensor Network Resilient Against Node Replication Attacks” university of Florida.  Jianping Wang, (2004) “ns-2 Tutorial”, Multimedia Networking Group.

16 WEB REFERENCE http://www.isi.edu/nsnam/ns/tutorial http://getch.wordpress.com/ http://enggedu.com/ http://www-rp.lip6.fr/ns-doc/ns226- doc/html/mobilenode_8h.htm http://www-rp.lip6.fr/ns-doc/ns226- doc/html/mobilenode_8h.htm http://hal.inria.fr/inria-00524354


Download ppt "Fixing the replicated Nodes in mobile Sensor Networks GUIDED BY Mr. N.SHIVA KUMAR Presented by K.Sumathy (08c117) C.Bindu Prasad (08c19)"

Similar presentations


Ads by Google