Top Banner
Intrusion Detection in Wireless Sensor Network Presented By Vinayak Raja(060) Sachin Sharma(020) Manvika Singh(031)
23

Intrusion detection in wireless sensor network

Apr 15, 2017

Download

Internet

Vinayak Raja
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Intrusion detection in wireless sensor network

Intrusion Detection in Wireless Sensor Network

Presented ByVinayak Raja(060)

Sachin Sharma(020)Manvika Singh(031)

Page 2: Intrusion detection in wireless sensor network

Wireless Sensor NetworkA wireless sensor network (WSN) consists of

distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure,

WSN is built of nodes.Each sensor node has following parts Radio Transceiver Microcontroller Energy Source(battery)

Page 3: Intrusion detection in wireless sensor network

ApplictationsArea monitoringEnvironmental/Earth monitoringIndustrial monitoringWater/Waste water monitoring

Page 4: Intrusion detection in wireless sensor network

Intrusion detection system (IDS) An intrusion detection system (IDS) is a device

or software application that monitors network or system activities for malicious activities policy violations and produces reports to a management station.

IDS typically record information related to observed events, notify security administrators of important observed events and produce reports

Page 5: Intrusion detection in wireless sensor network

Proposed SystemDetection Model

The detection model defines how the intruder can be detected.

Two detection models : single-sensing detection model multiple-sensing detection model

Page 6: Intrusion detection in wireless sensor network

Single Sensor NetworkIn single-sensing detection, the intruder can

be successfully detected by a single sensorPrevious work was according to

homogeneous single sensor in wireless sensor network

It is because individual sensors can only sense a portion of the intruder.Rec1

Source

Detector

Filter

Rec 3

Rec 2

Page 7: Intrusion detection in wireless sensor network

Disadvantages The sensed information provided by a single

sensor might be inadequate for recognizing the intruder.

So that there is no guarantee for our information has been sent securely.

Data will not routed if primary detector fails.

Page 8: Intrusion detection in wireless sensor network

Multiple Sensor NetworkIn multiple-sensing detection, the intruder

can be successfully detected by a single sensor

It is because individual sensors can only sense a portion of the intruder.

Data Flow

•Sending packet from source S to D

S2

Detec2

Detec3

B

C

S1

Detec1 A

•Intruder

Page 9: Intrusion detection in wireless sensor network

ModulesConstruction of Sensor NetworkPacket CreationAuthorization of portsConstruction of Packet Filters

Page 10: Intrusion detection in wireless sensor network

Construction of Sensor Network In this module, we are going to connect the

network.Each node is connected the neighboring node

and it is independently deployed in network area.

We give a port no to each node in network.Rec1

Source

Detector

Filter

Rec 3

Rec 2

Page 11: Intrusion detection in wireless sensor network

Packet CreationIn this module, we select the source file. And

selected data is converted into fixed size of packets. And the packet is send from source to detector.

Page 12: Intrusion detection in wireless sensor network

Authorization of portsIn this module we check whether the path is

authorized or unauthorized.According to port no only we are going to

find the path is authorized or Unauthorized. If path is authorized the packet is send to

valid destination. Otherwise the packet will be deleted.

Page 13: Intrusion detection in wireless sensor network

Construction of Packet FiltersIf the packet is received from other ports it

will be filtered and discarded. This filter only removes the unauthorized packets and send authorized packets to destination.

Page 14: Intrusion detection in wireless sensor network
Page 15: Intrusion detection in wireless sensor network
Page 16: Intrusion detection in wireless sensor network
Page 17: Intrusion detection in wireless sensor network
Page 18: Intrusion detection in wireless sensor network
Page 19: Intrusion detection in wireless sensor network
Page 20: Intrusion detection in wireless sensor network

Multiple Intrusion Detection

Page 21: Intrusion detection in wireless sensor network
Page 22: Intrusion detection in wireless sensor network
Page 23: Intrusion detection in wireless sensor network

THANK YOU