Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Similar documents
Intrusion Detection: Energy Efficient Approach in Assorted Wireless Sensor Networks

Wireless Sensor Networks

Balanced Load Sharing Protocol for Wireless Sensor Networks

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

Selective Forwarding Attacks Detection in WSNs

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Reservation Packet Medium Access Control for Wireless Sensor Networks

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Abstract. 1. Introduction

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

A NOVEL APPROACH FOR DETECTING COMPROMISED NODES IN WIRELESS SENSOR NETWORKS

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

Lecture 8 Wireless Sensor Networks: Overview

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Energy Efficient Tracking of Land-Based Targets Using Wireless Sensor Networks

An Optimized Lifetime Model using Energy Holes Reduction near Sink's Locality of WSN s

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks

Part I. Wireless Communication

A Study of Open Middleware for Wireless Sensor Networks

PROBABILITY OF INTRUSION DETECTION IN WIRELESS SENSOR NETWORKS

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

CAODV Free Blackhole Attack in Ad Hoc Networks

DE-LEACH: Distance and Energy Aware LEACH

Keywords T MAC protocol, reduction function, wsn, contention based mac protocols, energy efficiency; Fig 1. Listen and sleep cycle in S MAC protocol

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

An Efficient Low Power Transmission Over Long Range in Wireless Sensor Networks for environmental studies

Improving Connectivity via Relays Deployment in Wireless Sensor Networks

Wireless Sensor Networks applications and Protocols- A Review

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Detection of Wormhole Attacks in Wireless Sensor Networks

Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

Intrusion Detection System in Wireless Sensor Networks

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks

Wireless Sensor Networks --- Concepts and Challenges

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

CSE Department,SCAD CET,Tirunelveli,TamilNadu.

VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Wireless Sensor Networks --- Concepts and Challenges

IMPROVE NETWORK LIFETIME AND LOAD BALANCING MOBILE DATA CLUSTERING FOR WIRELESS SENSOR NETWORKS

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

A Distributed Cross-Layer Compromise Detection Mechanism for Wireless Sensor Networks

Energy Aware Location Based Routing Protocols in Wireless Sensor Networks

Survivability Evaluation in Wireless Sensor Network

Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Energy Aware Node Placement Algorithm for Wireless Sensor Network

An Adaptive and Optimal Distributed Clustering for Wireless Sensor

WSN WIRELESS WSN WSN WSN. Application agriculture SENSOR. Application geophysical. Application agriculture NETWORK: 11/30/2016

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

Study on Wireless Sensor Networks Challenges and Routing Protocols

Target Tracking in Wireless Sensor Network

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

Review on an Underwater Acoustic Networks

Security of Mobile Ad Hoc and Wireless Sensor Networks

Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network

Energy Efficiency Maximization for Wireless Sensor Networks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS

MultiHop Routing for Delay Minimization in WSN

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network

Optimized Node Deployment using Enhanced Particle Swarm Optimization for WSN

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

ESRP: Energy Sensitive Routing Protocol for Wireless Sensor Networks

A Non_Ack Routing Protocol in Ad-hoc Wireless Sensor Networks

Mobile Sensor Swapping for Network Lifetime Improvement

ARCS: A SIMULATOR FOR DISTRIBUTED SENSOR NETWORKS

Design Issues, Characteristics and Challenges in Routing Protocols for Wireless Sensor Networks

Ad Hoc & Sensor Networks

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis

INVESTIGATION ON DELAY AND POWER MINIMIZATION IN IEEE PROTOCOL USING CSMA-CA ALGORITHM

ISSN: [Krishan Bala* et al., 6(12): December, 2017] Impact Factor: 4.116

Wireless Sensor Networks (WSN)

GIS based topology for wireless sensor network modeling: Arc-Node topology approach

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

Transcription:

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Chennai) 1 Vladymir.F, 2 J.Sivanesa Selvan, 3 Mr.Prabhu.D 1 (Information Technology, Loyola Institute of Technology, Chennai) ( Email: vladymir_f@yahoo.in) 2 (Information Technology, Loyola Institute of Technology, Chennai) ( Emial: sivanesh433.rock@gmail.com) 3 Asst.Professor(Information Technology, Loyola Institute of Technology,. ABSTRACT - Intrusion detection plays an important role in the area of security in WSN. Detection of any type of intruder is essential in case of WSN. WSN consumes a lot of energy to detect an intruder. Therefore we derive an algorithm for energy efficient external and internal intrusion detection. We also analyse the probability of detecting the intruder for heterogeneous WSN. This paper considers single sensing and multi sensing intruder detection models. It is found that our experimental results validate the theoretical results. Keywords : WSN, MANET SPINS,LEAPS 1.INTRODUCTION WSN is common in different types of application scenarios. It includes a set of sensor nodes deployed over a geographical area to monitor a variety of phenomenons. However, challenges and difficulties still exist. The sensor nodes own limited power, processing and sensing ability. The sensor nodes are prone to failure because of lack of power, physical damage etc. Since the information generated by a single node is usually incomplete or inaccurate, and the applications need collaborative communication and computation among multiple sensors multiple sensing models can be used. A Heterogeneous WSN is more complex as compared to homogeneous WSN and which consists of a number of sensor nodes of different types deployed in a particular area and which are collectively working together to achieve a particular aim. The aim may be any of the physical or environmental condition. For e.g. the wireless sensor network is mainly used in military applications such as in borders for finding out the infiltrations. It is also used in industrial process monitoring and control, machine health monitoring, environment and habitat monitoring, healthcare applications, home automation and traffic control. WSN become increasingly useful in variety critical applications, such as environmental monitoring, smart offices, battlefield Page 1334

surveil- lance and transportation traffic monitoring. The sensor nodes are tiny and limited in power. Sensor types vary according to the application of WSN. Whatever be the application, the resources such as power, memory and band width are limited. Moreover, most of the sensor nodes are throw away in nature. Therefore it is vital to consider energy efficiency so as to maximize the life time of the WSN. Great efforts have been devoted to minimizing the energy consumption and extending the lifetime of the network. One common way is to put some sensor nodes in sleep mode to save energy and wake them up under some strategies. Work towards maximizing the life time of WSN has been studied in many research works. Some of them lead to the need of heterogeneous WSN deployment. Lee et al. analyse heterogeneous deployments both mathematically and through simulations in different deployment environments and network operation models. Hu et al. investigate some fundamental questions for hybrid deployment of sensor network, and propose a cost model and integer linear programming problem formulation for minimizing energy usage and maximizing lifetime in a hybrid sensor network. Their studies show that network lifetime can be increased dramatically with the addition of extra micro-servers, and the locations of micro-servers can affect the lifetime of network significantly. Intrusion detection plays an important role in the area of computer security, in particular network security, so an attempt to apply the idea in WSNs makes a lot of sense. However, there are currently only a few studies in this area. Da Silva et al. and Onat and Miri propose similar IDS systems, where certain monitor nodes in the network are responsible for monitoring their neighbours, looking for intruders. They listen to messages in their radio range and store in a buffer specific message fields that might be useful to an IDS system running within a sensor node. For this purpose, a number of sensors, N, are deployed in an area of interest, A, to monitor the environmental changes by using optical, mechanical, acoustic, thermal, RF and magnetic sensing modalities. In this way, possible intruder approaching or travelling inside the deployment field can be detected by the WSN if it enters into the sensing range(s) of one or multiple sensor. Page 1335

2, SYSTEM ANALYSIS 2.1 Existing System In single-sensing detection, at a time only one intruder detected by the WSN. Our Previous work was according to homogeneous and heterogeneous single sensor in wireless sensor network. Disadvantage: The sensed information provided by a single sensor might be inadequate for recognizing the intruder. So that there is no guarantee for our information has been sent securely. Data will not routed if primary 2.2 Proposed System In Heterogeneous wireless sensor,intruder detected anywhere in the network. We are detecting the intruder in multiple sensor heterogeneous wireless sensor networks. Advantage: If primary detector fails another detector detect the intruder. By finding the intruders we can send our information in a secured manner 3. IMPLEMENTATION 3.1 A graphical tool used to describe and analyze the moment of data through a system manual or automated including the process, stores of data, and delays in the system. Data Flow Diagrams are the central tool and the basis from which other components are developed. The transformation of data from input to output, through processes, may be described logically and independently of the physical components associated with the system. The DFD is also know as a data flow graph or a bubble chart. DFDs are the model of the proposed system. They clearly should show the requirements on which the new system should be built. Later during design activity this is taken as the basis for drawing the system s structure charts. The Basic Notation used to create a DFD s are as follows: 1. Dataflow: Data move in a specific direction from an origin to a destination. Page 1336

2. Process: People, procedures, or devices that use or produce (Transform) Data. The physical component is not identified. 3. Source: External sources or destination of data, which may be People, programs, organizations or other entities. Detec1 A S1 Detec2 B S2 Detec3 C Data Flow Sending packet from source S to D In tr u Page 1337

Homogeneous Rec1 Rec 3 Detector Source Rec 2 Filter TESTING TESTING OBJECTIVES Performance Tests are utilized in order to determine the widely defined performance of the software system such as an execution time associated with various parts of the code, response time(in case of embedded systems),and device utilization. The intent of this type of testing is to identify weak points of a software system and quantifying its shortcomings, leading to further improvements. Stress Tests are designed to break a software module. This type of testing determines the strengths and limitations of the software. Structure Tests are aimed at exercising the internal logic of a software system. Testing In Small-Testing In The Large. The underlying criterion concerns which part of the system is subject to testing. If we are concerned with individual modules, procedures, and functions, this lead to testing in the small. Testing in the large is primarily devoted to integration testing when the system is developed out of some already constructed modules. Black Box-White(Glass)Box Testing. As the name suggests, the criterion leading Page 1338

to this type of discrimination specifies whether the internal(logical)structure of the system is available for testing purposes. if so,we are concerned with white box testing. If the internal structure is not available or exercised when developing the test suite, we confine ourselves to black box testing. Depending which way was selected, the points of view on testing are also radically different. In black box testing we are interested to test what the system is supposed to do. The testing is worked out from input data perspective; subsequently we see if the outputs (actions) of the software match the expected values. Functional, stress, and performance tests fall under this general category. In white box testing, testing concentrates on what the system does.essentially, using detailed knowledge of code, one creates a battery of tests in such a way that they exercise all components of the code (say, statements, branches, paths).structural testing sub schemes whiteboxtesting 2.CONCULSION AND FUTUREWORK: Page 1339

This paper speaks about the minimization of external intrusion detection in an energy efficient way and probability of intrusion detection in a heterogeneous WSN deployed in a two dimensional space. This probability gives an insight in to the required number of sensors in a given deployment, their sensing and transmission range to efficiently detect an intruder in a given WSN. We have developed an analytical model for intrusion detection and applied the same into single-sensing detection and multiplesensing detection scenarios for heterogeneous WSNs. The correctness of the analytical model is proved by simulation. REFERENCES I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A Survey on Sensor Networks, IEEECommunication Magazine, vol. 40, no. 8, pp. 102-14, Aug. 2002. [2] Lee, J.J., Krishnamachari, B., Kuo, C.C.J.: Impact of Heterogeneous Deployment on Lifetime Sensing Coverage in Sensor Networks (IEEE SECON). (2004) [3] Hu, W., Chou, C.T., Jha, S., and Bulusu, N.: Deploying Long- Lived and Cost-effective Hybrid Sensor Networks. Elsevier Ad- Hoc Networks, Vol. 4, Issue 6. (2006) 749-767. [4] A. P. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. C. Wong, Decentralized intrusion detection in wireless sensor networks, in Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. [5] I. Onat and A. Miri, An intrusion detection system for wireless sensor networks, in Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, vol. 3, Montreal, Canada, August 2005, pp. 253 259. [6] A. Perrig, et al., SPINS: Security Protocols for Sensor Networks, Wireless Networks, 8(5):521-534, Sep. 2002. Page 1340

Powered by TCPDF (www.tcpdf.org) International Journal of Advanced Research in Computer Science Engineering and Information Technology [7] S. Zhu, S. Setia, and S. Jajodia, LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks, Proc. of the 10th ACM Conference on Computer and Communications Security (CCS '03), Oct. 2003. [8] J. Deng, R. Han, and S. Mishra, A Performance Evaluation of Intrusion-tolerant Routing in Wireless Sensor Networks, Proc. of the 2nd Int. IEEE Workshop on Information Processing in Sensor Networks (IPSN 03), Apr. 2003. [9] Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal, Intrusion detection in homogeneous and heterogeneous wireless sensor networks, IEEE Transactions on Mobile Computing, vol. 7, no. 6, pp. 698 711, 2008. [10] O. Dousse, C. Tavoularis, and P. Thiran, Delay of intrusion detection in wireless sensor networks, in Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2006. Page 1341