Secure data accumulation by ant agents in wireless sensor network using randomized dispersive routing Mechanism U.Moulali 1 2 N.

Similar documents
A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

sensors ISSN

Routing Protocols and the IP Layer

A Review: Optimization of Energy in Wireless Sensor Networks

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET)

A Review of Ant Colony based Routing Algorithm in Wireless Ad-hoc Networks

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

A Secure Routing Protocol for Wireless Adhoc Network Creation

Traffic and Security using Randomized Dispersive Routes in Heterogeneous Sensor Network

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Routing protocols in WSN

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

Mitigating Malicious Activities by Providing New Acknowledgment Approach

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

A Fuzzy Optimized, Bee inspired Routing Protocol for Improved QoS in Mobile Ad Hoc Networks

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Detection of Wormhole Attacks in Wireless Sensor Networks

Performance Analysis and Enhancement of Routing Protocol in Manet

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

An Innovative Approach to increase the Life time of Wireless Sensor Networks

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Ant Colony Based Optimistic Route Discovery and Packet Distribution Approach

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

AES and DES Using Secure and Dynamic Data Storage in Cloud

Webpage: Volume 4, Issue VI, June 2016 ISSN

Optimized Coverage and Efficient Load Balancing Algorithm for WSNs-A Survey P.Gowtham 1, P.Vivek Karthick 2

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

Performance Comparison and Analysis of DSDV and AODV for MANET

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Performance Improvement of Wireless Network Using Modern Simulation Tools

Enhancing Life Span for WSN Nodes using LEACH, Huffman Data Fusion and TSP- NN Algorithm

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Asst. Prof. Information Technology Dept. 1, 2, 3, The Technological Institute of Textile and Sciences, Bhiwani, Haryana, India

ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE

ISSN Vol.04,Issue.12, September-2016, Pages:

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

Virtual Energy-Efficient Encryption and Keying (VEEEK) for Wireless Sensor Networks

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler

Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks

A Review on Mobile Ad-hoc Networks (MANET S) with Attacks Impact

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Detecting Insider Attacks on Databases using Blockchains

Bee Inspired and Fuzzy Optimized AODV Routing Protocol

A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization

Secured Routing Protocols for Wireless & ATM Networks : An Analysis

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Data Accumulation using Sampled Dispersive Routes in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks

An Algorithm for Dynamic SDN Controller in Data Centre Networks

Optimization of Ant based Cluster Head Election Algorithm in Wireless Sensor Networks

Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast)

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

Design and Development of Secure Data Cache Framework. Please purchase PDF Split-Merge on to remove this watermark.

Splitting of traffic to maximize the data transmission in mobile ad hoc network under different constraints

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN

import java.util.scanner; import java.io.*;

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Performance Evaluation of Various Routing Protocols in MANET

A Novel Energy Saving Scheme using Potential Based Dynamic Routing in Wireless Sensor Networks

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

International Journal of Current Trends in Engineering & Technology Volume: 02, Issue: 01 (JAN-FAB 2016)

An Energy Efficient Intrusion Detection System in MANET.

Introduction to Mobile Ad hoc Networks (MANETs)

Energy Efficient and Collision Aware Routing Algorithm for Wireless Sensor Networks

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

A Robust Trust Aware Secure Intrusion Detection for MANETs

A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN

Spoofing Detection in Wireless Networks

A Review on Black Hole Attack in MANET

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

AN EFFICIENT DETECTION AND PREVENTION OF DDoS ATTACK IN WSN

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

Transcription:

Secure data accumulation by ant agents in wireless sensor network using randomized dispersive routing Mechanism U.Moulali 1 2 N.Sainath 1 Sr.Asst Prof, Dept. of CSE, QISCET, Ongole, India moulali.u@gmail.com 2 Research Scholar, Department of CSE, JNTUH,Kukatpally, Hyderabad. Andhrapradesh, India. E-Mail : natukulasainath@gmail.com Mob:9440590561 Abstract In this paper we discuss the implementation of data accumulation in wireless sensor networks and also the methods to increase the security of the accumulated data using dispersive routing techniques like NRRP( Non Repetitive Random Propagation). The data accumulation is accomplished by the concept of Honey Ants and ant based routing and the implementation of the Dijkstra s algorithm to reach the data using the shortest path. Further the use of NRRP assures that the data is securely transported from the source to the sink by the ant agents. Keywords- Accumulation, Dispersive routing. INTRODUCTION As WSN is mostly used for gathering application specific information from the surrounding environment, it is highly essential to protect the sensitive data from unauthorized access. WSNs are vulnerable to security attacks due to the broadcast nature of radio transmission. Sensor nodes may also be physically captured or destroyed by the enemies. The uses of sensor network in various applications emphasis on secure routing. Various protocols are proposed for routing and data gathering but none of them are designed with security as a goal. Sensor nodes are restricted with limited amount of resources. One such resource is storage. The storage problem can be resolved by the introduction of Ant Agents. These agents traverse the network accumulating data and transmitting the data from the source to the sink. The mobile agents traverse the network for data accumulation. Once the data is found the other mobile agents are intimated of this available data. The mobile agents hence collectively reach the data source using any shortest path algorithm; these agents carry some data and traverse the network to deposit this data into a sink 195 that acts as spare storage. spare storage implementation is done by the administrator. Generally a well known and efficient routing algorithm is used to deliver the data from source to the sink. The security of the data thus travelling in such routes is compromised as the adversary can easily compute the route to be taken by the data by just getting the routing algorithm information. Two major attacks are that are likely to occur are the Denial of Service (DoS) and the compromised node attack. In order to avoid this, the path taken by these agents from the source to the sink can be randomized to avoid the adversary from gaining information on the route taken by these agents. Hence the need for random propagation. OVERVIEW The intent of this project is to design a cooperative data accumulation technique called Honey Ant data Accumulation [1] and avoid the possible DoS and CN attacks over the nodes in the network by using Dispersive Randomized Routing Algorithm like NRRP [2] to enhance the security of data transmitted over the network. The design involves putting up migratory data transporting agents called Ant Agents, which are similar to Mobile Agents in some aspects. These Ant Agents originate at the sensing device and migrate the network, foraging for 'repletes' that have spare storage capacity. Once found, the agent deposits the data on the host 'replete' and returns back to its originating node to fetch the next piece of information. The ant agents use shortest path algorithm like the Dijkstra s algorithm to reach the source node that generates the data, after collecting the data the ant agent follow a different route to take the data towards the spare storage node called as replete to deposit the data. This can be accomplished by generating randomized routes. One such way to generate the path is using the NRRP protocol.

ARCHITECTURE In this section we discuss the architecture of our system as shown in Fig 1. Considering the resource constraints of the nodes involved, the system architecture [3] [4] aims to offload as much intelligence as possible on to the Ant Agents while keeping its device support requirements to a bare minimum. The Security Manager first verifies the credentials of all incoming Ant Agents. AAs with valid security credentials are then queued up for execution at the Virtual Machine. The Virtual Machine acts as a hardware abstraction layer for loading, scheduling and executing tasks generated by incoming AAs. It interfaces with the Resource Manager, which estimates the amount of storage space left in Tag Space. The Tag Space represents the name-based memory region that stores data objects persistent across AA executions. When an AA is executed at the Virtual Machine, it first queries the Resource Manager to check if the hosting device is can be its 'replete '. If yes, the sensor data is now deposited in the Tag Space of the hosting device. If not, the AA continues its foraging phase by executing its ant routing algorithm. Post execution, the AAs is injected back into the network to allow them to migrate to their next destination. Fig 1: System Architecture IV. TAG SPACE AND ANT AGENT STRUCTURE A Tag Space [5] consists of a limited number of tags that are persistent across AA executions. Fig 2 illustrates the structure of a tag. It consists of an identifier, a digital signature, lifetime information and data. The identifier represents the name of the tag. The access of AAs to tags is restricted based on the digital signature. The tag lifetime specifies the time at which the tag will be reclaimed by the device from the Tag Space. AAs can store data (like pheromone) at the Tag Space by creating their own tags. 196 Fig 2: Tag Space In addition to its identity and authentication information, an AA is comprised of a code section, a data section as well as a lightweight execution state. A digital signature together with the AA and sensor IDs identifies an AA. The digital signature is used by the host devices to protect the access to an AA tags. The code and data sections contain mobile code and sensor data that an AA carries from one device to another. The data section sets a bound on the expected storage needs of the AA at the host device. Fig 3 depicts the skeletal structure of the Ant Agent. Fig 3: Ant Agent format DIJKSTRA S ALGORITHM The algorithm maintains two sets of vertices S and Q. Set S contains all vertices for which we know that the value d[v] is already the cost of the shortest path and set Q contains all other vertices. Set S starts empty, and in each step one vertex is moved from Q to S. This vertex is chosen as the vertex with lowest value of d[u]. When a vertex u is moved to S, the algorithm relaxes every outgoing edge (u,v). DIJKSTRA (G, w, s) pseudo code 1 Function Dijkstra(G, w, s) 2 for each vertex v in V[G] // Initialization 3 do d[v] := infinity 4 previous[v] := undefined 5 d[s] := 0 6 S := empty set 7 Q := set of all vertices 8 while Q is not an empty set 9 do u := Extract-Min(Q) 10 S := S union {u} 11 for each edge (u,v) outgoing from u 12 do if d[v] > d[u] + w(u,v) //Relax( u,v) 13 then d[v] := d[u] + w(u,v) 14 previous[v] := u The Dijkstra s algorithm has been used to find the shortest path from the source to destination. In this project we use the Dijkstra s algorithm to find the shortest path to find the data generating node. The Ant Agents generated in each of the node of the network traverse the network to find the data generating node, once the data generating node is found then the Ant Agents intimate other ant agents of the source. These Ant Agents reach the data generating node through the shortest path of the

network. The Algorithm used by the Ant Agents or this regard is the Dijkstra s single source shortest path Algorithm [6] [7]. Thus the Ant agents reach the data generating source to take the data to the Replete which is the destination node in this scenario. NON REPETITIVE RANDOM PROPAGATION NRRP improves the propagation efficiency by recording all the nodes that the propagation has traversed so far. More specifically, NRRP adds a node-in-route (NIR) field to the header of each share. Initially, this field is empty. Starting from the source node, whenever a node propagates the share to the next hop, the id of the up-stream node is appended to the share s NIR field. Nodes included in NIR are excluded from the random pick of the next hop of propagation. This non repetitive propagation guarantees that the share will be relayed to a different node in each step of random propagation, leading to better propagation efficiency. AD-HOC COOPERATIVE STORAGE In order to realize the local, in-network storage of the generated sensor data, we introduce a distributed storage model called the "Ad-hoc Cooperative Storage" (ACS) model, that is based on the behaviour of Honey Ants in the real world. The basic idea in implementing storage in the network is through the cooperation among the individual nodes in the network. Just like the 'majors' among Honey Ants, nodes with spare storage capacity in wireless sensor networks, volunteer to become 'replete' in the proposed model. The data generating sensors then create and inject "Ant Agents" (AA) into the network which essentially functions as Honey Ants food fetching medium sized workers. These AAs not only carry sensor data but also forage the network for 'repletes' to gorge them with information. Eventually, when the sink node becomes available, it also injects AAs into the network albeit for a different purpose. The sink injected AAs are akin to the hungry members of the Honey Ant colony, which deplete the 'repletes' of their food reserves. Like any mobile agent, an AA too carries along with it its mobile code as well as its lightweight execution state. AAs are also self routing, namely, they are responsible for determining their own paths through the network. In the proposed ACS model, AAs forage the network for 'repletes' using shortest path Dijkstra s algorithm, once the replete is found they take on a new strategy and travel using non repetitive path protocol (NRRP)Such routing algorithms based on the behavior of social insects are known to result in optimal routes between the 197 source and the destination. The execution of AAs in the ACS model can be described in two phases: forage and migrate phase followed by a information deposit phase. The AA execution performed at each step may differ based on the storage properties of its hosting device. On devices that meet the targeted storage properties ( repletes ), an AA may deposit its information while on other devices it only executes its ant routing algorithm. From the ANs point of view, devices with the same storage properties are interchangeable. The forage and migrate phases are followed by the information deposit page. The forage and migrate phase may use the shortest path algorithm and the information deposit phase uses NRRP. IMPLEMENTATION The system is implemented comprising of 3 modules Ant agent module Replete module Monitor module A. Ant Agent and Replete Module The nodes are off 2 types namely the data generating normal nodes and the replete node. The replete nodes cannot introduce ant agents in the network. The Process begins where the administrator registers as either ant agent on a node or as a replete. If it is registered as ant agent then these entities go in search of data generated so as to collect it and store in the replete node If the node is registered as replete then it does not produce any data but stores the data that is brought in by the ant agents. C. Monitor Module The process begins from the Monitor operations which monitors and keeps log of the entire system. The Monitor will receive information regarding the data available in the network from the Repletes, based on this 2 steps are taken Send all ant agents to collect the data from the source. Carry the data from the source to the spare node/ replete. After this the process stops, we can Refresh the process to start from beginning. TOPOLOGOGY IMPLEMENTATION The network topology can be designed by the network administrator. Various topologies that give

a well connected network can be implemented. in Fig 4, its 2 algorithms namely the Dijkstra s This project uses the following topology algorithm to find the shortest path to the data comprising of 5 nodes. In this 5 node topology the generating node and the NRRP algorithm towards administrator decides which the data generating depositing data on the data storing node or the node is and which happens to be the replete data replete node. Weights can be randomly assigned to storing node. the links. This projects works on the topology as shown REFERENCES [1] Santosh Kulkarni and Prathima Agrawal, Honey Ant based cooperative data accumulation in wireless sensor networks, 2011 [2] Tao Shu, Sisi Liu, and Marwan Krunz, Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Route, 2010. Fig 4: Network Topology CONCLUSION AND FUTURE WORK The data carried by the mobile agents deploying the NRRP method are more efficient and the routes more secure than those carried by mobile agents using the PRP method. NRRP assures that the data is not transmitted back and forth between the neighboring hops hence is more efficient in transmitting the data from source to sink using the mobile agents. Moreover the storage issue is also been addressed by the use of Adhoc Cooperative Storage model. The randomness of this method as compared to the traditional deterministic algorithm deployed usually enhances the security of the data and prevents the occurrences of DoS a CN attacks. More efficient propagation algorithms like Multicast Tree-assisted Random Propagation (MTRP) and Directed Random Propagation (DRP) [2] [8] can be implemented. Various intrusion detection schemes that detect the presence of intruders and their malicious activity can also be included. Further the data received at the sink can be checked if its been manipulated during its routing. If so corrective measures can also be included to enhance security of the data transferred. [3] S. Kulkarni and P. Agrawal, "Ad-hoc cooperative computation in wireless networks using ant like agents:' in Proceedings of the 17 th International Coriference on Advanced Computing and Communications (ADCOM), 2009. [4] P. C. Lee, V. Misra, and D. Rubenstein. Distributed algorithms for secure multipath routing in attack-resistant networks. IEEE/ACM Transactions on Networking, 15(6):1490 1501, Dec. 2007. [5] "Scalable and efficient ant-based routing algorithm for ad-hoc networks:' IEICE Transactions on Communications, vol. E-89B, no. 4, pp. 1231-1238, January 2006.R. [6] Tao Shu, Sisi Liu, and Marwan Krunz, (2010) Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes [7] P. C. Lee, V. Misra, and D. Rubenstein. Distributed algorithms for secure multipath routing in attack-resistant networks. IEEE/ACM Transactions on Networking, 15(6):1490 1501, Dec. 2007. [8] W. Lou and Y. Kwon. H-spread: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transactions on Vehicular technology 55(4):1320-1330, July 2006. 198

Author s Information 1 U.Moulali B.Tech from Alfa College of Engineering M.Tech SE from St.Mary s College of Engineering & Technology. Currently he is working as Sr.Assistant Professor at QIS college of engineering, Ongole. His areas of interest include Data mining, Network Security, Software Engineering, Sensor Networks, Cloud Computing. 2 N.Sainath B.Tech CSE from JayaPrakash Narayana College of Engineering M.Tech SE from Srinidhi Institute of Technology. Currently he is Research Scholar at JNTU Hyderabad. His areas of interest include Data mining, Network Security, Software Engineering, Sensor Networks, Cloud Computing. He is Enrolled for the Professional memberships of IEEE, CSI, MISTE, IAENG, CSTA. He has Published 12 papers in International Journals and has 6 International conference Proceedings and attended 12 workshops and 10 National conferences. 199