Top Banner
Mitigate Mitigate Packet Droppers and Packet Droppers and Modifiers In Modifiers In Wireless Sensor Wireless Sensor Networks Networks GUIDE BY Dr.A.VALARMATHI Assistant professor Department of Computer Application University College of Engineering BIT Campus,Tiruchirapalli. PRESENTED BY K.KALAIYARASAN
13
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Phase 2 Final Review

Node Categorization Node Categorization Algorithm Algorithm To Mitigate To Mitigate Packet Droppers and Packet Droppers and Modifiers InModifiers In Wireless Sensor Networks Wireless Sensor Networks

GUIDE BY

Dr.A.VALARMATHIAssistant professorDepartment of Computer ApplicationUniversity College of EngineeringBIT Campus,Tiruchirapalli.

PRESENTED BY

K.KALAIYARASAN

Page 2: Phase 2 Final Review

ABSTRACTABSTRACT Packet dropping and modification

are common attacks that can be launched by an adversary to disrupt communication in wireless multi-hop sensor networks.

Many schemes have been proposed to mitigate or tolerate such attacks but very few can effectively and efficiently identify the intruders.

Page 3: Phase 2 Final Review

EXISTING SYSTEM EXISTING SYSTEM

There is no checking of packet loss and finding the intruders.

It lacks physical protection and is subject to node compromise.

An adversary may launch various attacks to disrupt the

in-network communication.

Among these attacks, two common ones are dropping

packets and modifying packets.

Page 4: Phase 2 Final Review

PROPOSED SYSTEMPROPOSED SYSTEM

We propose a simple yet effective scheme to identify misbehaving forwarders that drop or modify packets.

Finally, most of the bad nodes can be

identified by our Two Ack Technique.

Page 5: Phase 2 Final Review

SOFTWARE AND HARDWARE REQUIREMENTSHARDWAREProcessor : PENTIUM IV 2.6 GHz, Intel Core

2 Duo Ram : 512 MB DD RAM

SOFTWAREFront End : JAVABack End : MS SQL 2005OS : Windows XP IDE : Netbeans

Page 6: Phase 2 Final Review

Architecture Diagram

Accepted By Sink

DroppedBy Sink

Original data send by Node 1

Sink

Sensor Node 2

Sensor Node 1

Sensor Node 3

Packet is dropped by Sensor Node - 3

Packet is modified and forwarded by Sensor Node -3

Packet is forwarded by Sensor Node-3

Wireless Sensor Network

Wireless Sensor Network

Page 7: Phase 2 Final Review

Modules

Key Generation & Tree Formation

Identify Packet Modifiers.

Identify Packet Droppers.

Page 8: Phase 2 Final Review

IMPLEMENTATION(SCREENSHOTS)

Page 9: Phase 2 Final Review

Screen shots

Page 10: Phase 2 Final Review

Screen shots

Page 11: Phase 2 Final Review

CONCLUSIONThe concept of adopting a hybrid scheme in AACK

greatly reduces the network overhead, but both TWOACK and AACK still suffer from the problem that they fail to detect malicious nodes with the presence of false misbehavior report and forged acknowledgment packets

Page 12: Phase 2 Final Review

Future EnhancementFuture EnhancementFurthermore, in an effort to prevent the attackers from

initiating forged acknowledgment attacks, we extended our research to incorporate digital signature in our proposed scheme. Although it generates more ROs in some cases, as demonstrated in our experiment, it can vastly improve the network’s PDR when the attackers are smart enough to forge acknowledgment packets

Page 13: Phase 2 Final Review

REFERENCESREFERENCES[1] Catching Packet Droppers and Modifiers in Wireless Sensor

Networks Chuang Wang, Taiming Feng, Jinsook Kim, Guiling Wang,

Member, IEEE, andWensheng Zhang, Member, IEEE

[2] Barak, B, Goldberg, S. and Xiao, D. (2008) ‘Protocols and lo r

bounds for failure localization in the internet’ in Eurocrypt.

[3] Bhuse,V, Gupta, A. and Lilien, L. (2005) ‘Dpdsn: Detection of packet

dropping’, RFC STD 3, 1123, Internet Engineering Task Force.

[4] Karlof, C. and Wagner, D. (2003), ‘Secure routing in wireless sensor

networks: attacks and countermeasures’, “in the First IEEE

International Workshop on Sensor network protocols and applications..