8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
1/19
ENERGY EFFICIENT SECUREIDS BASED ROUTING
SCEHEME IN WIRELESS
SENSOR NETWORKS
Guide Name: Submitted by:Mrs. L.VEEBA M.E.., D.RAMKUMAR AP/CSE, M.E CSE ,KCET. KCET.
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
2/19
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
3/19
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
4/19
Proposed SystemThe proposed approach for ensuring data privacy protection in WSNs through anenergy-efficient network backbone is comprised of two phases.we proposed a distance based energy aware routing (DEAR) algorithm on selectedoptimal path through Ant colony optimization (ACO).The objective of this phase is to balance the available amount of energy in the wholeWSNs as well as to maximize the network lifetime.There are a number of reasons that ACO algorithms are a good fit for WSN routing.ACO algorithms are decentralized just as WSNs are similarly decentralized. In WSNs nodes can break, run out of energy and have the radio propagation
characteristics change. ACO algorithms have been shown to react quickly tochanges in the network .When the event boost the initialization has to be sent on ACO to initiate the alreadyobtained optimal path. The actual sensed data will be sent under the control of DPP(data privacy protection) for protecting the sensory data readings from malicious.
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
5/19
CONTD.. We are implementing a new system that support both network efficiency andsecurity.
We are implementing new ids(intrusion detection system ) based technique.Our system we are implementing ids on each and every clients. ids is operated
based on certain predefined rules. this rules are early created by the network
administrator.
ids monitoring search and every system suppose any miss behavior activities will be happen it will forward the message to cluster head.
we are using ACO Scheduling algorithm . compared to multipath routing
algorithm ACO provide very good efficiency.
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
6/19
AdvantageMultipath Routing Algorithm Sometimes Drop A Packets But Provide Full Guaranty
Data Delivery.
It choose a path from already used optimal path so avoid path searching time.
Timing efficiency is high.
Energy efficiency is very high.
Full confidentiality and security.
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
7/19
Modules used in our system.
Network ModelCreating data communication.
Implementing ids.
Deploying ids.
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
8/19
Network Model:
We create sample network that contain both clients and cluster heads.Each cluster head act as header. we are giving access control node traceability
to cluster header at this module.
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
9/19
Creating Data Communication.
We are setting a path to create a communication to all and other nodes.
Each and every node cannot forward their message without cluster head permission.
Each and every node in a cluster having interconnection with one another.
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
10/19
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
11/19
DEPLOYING ids.
we are deploy a ids on individual cluster nodes .
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
12/19
ARCHITECTURE DIAGRAM
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
13/19
FUTURE WORK:For future work, we plan to explore more extensive malicious attacks inaddition to packet dropping and bad mouthing attacks, each with differentimplications to energy, security and reliability, and investigate intrusiondetection and multipath routing based tolerance protocols to react to these
attacks. Another direction is to consider smart and insidious attackers whichcan perform more targeted attacks, capture certain strategic nodes with higherprobability, alternate between benign and malicious behavior and collude withother attackers to avoid intrusion detection.
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
14/19
CONCLUSION: we performed a tradeoff analysis of energy consumption vs. QoS gain in
reliability, timeliness, and security for redundancy management of clustered
heterogeneous wireless sensor networks utilizing multipath routing to answer
user queries.
Finally, we applied our analysis results to the design of a dynamic redundancy
management algorithm to identify and apply the best design parameter
settings at runtime in response to environment changes to prolong the systemlifetime.
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
15/19
SOFTWARE REQUIREMENTTOOLS USED :JDK 1.6,NETBEANS
LANGUAGE : JAVABACKEND : MY SQL
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
16/19
HARDWARE REQUIREMENTMONITOR: RGB MONITORRAM: 1GBHARD DISK :20 GB
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
17/19
REFERENCES: V. Bhuse and A. Gupta, Anomaly intrusion detectionin wireless sensor networks, J. High Speed Netw., vol. 15, no. 1, pp. 33 51, 2006. S. Qun, Power management in networked sensorradios a network energy model, in Proc. 2007 IEEESensors Appl. Symp.,
T. Shu, M. Krunz, and S. Liu, Secure data collection in wireless sensor networks using randomized dispersiveroutes, IEEE Trans. MobileComput., vol. 9, no. 7, pp.941954, 2010.
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
18/19
CONTD..C. J. Fung, Z. Jie, I. Aib, and R. Boutaba, Dirichlet -based trust management for effective collaborativeintrusion detection networks, IEEE Trans. Netw.Service Manage., vol. 8, no. 2, pp. 79 91, 2011.F. Bao, I. R. Chen, M. Chang, and J. Cho, Hierarchicaltrust management for wireless sensor networks and itsapplications to trust-based routing and intrusiondetection, IEEE Trans. Netw. Service Manage., vol. 9,no. 2, pp. 161183, 2012.
8/13/2019 Energy Efficient Secure Ids Based Routing Sceheme in Ids
19/19
THANK YOU