redundancy management in heterogeneous wireless sensor networks

Post on 15-Jul-2015

224 Views

Category:

Technology

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

REDUNDANCY MANAGEMENT IN

HETEROGENEOUSWIRELESS

SENSOR NETWORKS

By: Saeid Hossein Pour lotomi

Roll No: 12011D4026

Guide: Ms.E.Hemalatha

• Introduction• Modules• Screenshots• Conclusion• Future work• References

Overview

Introduction

• WSNs are deployed in an unattendedenvironment.

• limited resources, a WSN must satisfy:i. QoS requirements and alsoii. minimize energy consumption

to prolong the system useful lifetime.• Tradeoff between energy consumption vs.

QoS gain with the goal to maximize the WSNsystem lifetime has been well explored in theliterature.

• No prior work exists to consider the tradeoffin the presence of malicious attackers.

The components of a sensor node

• In mathematics, a Voronoi diagram is a way of dividing space intoa number of regions.

What is Wireless Sensor Networks?

• WSN is composed of a large number of wireless sensors with low processing power and energy consumption for monitoring a certain environment

Modules

I. Attack ScenarioII. Compromised NodeIII. Redundancy ManagementIV. Dynamic Redundancy Management

Algorithm

Attack Scenario• All sensors are subject to capture attacks• Intrusion/fault Tolerance

Through multipath routing• Two most energy conserving attacks

I. Bad-mouthing attackII. Packet dropping attacks

Compromised Node• To detect compromised nodes, every node runs

a simple host IDS to assess its neighbors.• The IDS is light-weight to conserve energy. It is

also generic and does not rely on the feedbackmechanism tied in with a specific routingprotocol .

• It is based on local monitoring. That is, eachnode monitors its neighbor nodes only.

• To remove malicious nodes from the system, avotingbased distributed IDS is appliedperiodically in every TIDS (IDS interval time(sec)).

• It analyses the network by collecting sufficientamount of data and detects unusual behavior ofsensor node.

Redundancy Management

• Increase source or path redundancy enhancereliability , security. However, it also increasesthe energy consumption (system lifetime).

• Tradeoff between QoS vs. energy consumptionby using distributed IDS.

• Maximize life time of a HWSN(MTTF)

Algorithm for Dynamic Redundancy Management of multipath routing algorithm.

The objective of dynamicredundancy management is todynamically identify and apply thebest redundancy level in terms ofpath redundancy (mp) and sourceredundancy (ms), as well as thebest intrusion detection settings interms of the number of voters (m)and the intrusion invocationinterval (TIDS) to maximize MTTF.

CH Execution for Dynamic Redundancy Management.1: CH Execution:2: Get next event3: if event is TD timer then4: determine radio range to maintain CH connectivity5: determine optimal TIDS,m,ms,mP

6: notify SNS within the cluster of the new optimal settings of TIDS and m

7: else if event is query arrival then8: trigger multipath routing using mS and mP

9: else if event is Tclustering timer then10: perform clustering11: else if event is TIDS timer then12: for each neighbor CH13: if selected as a voter then14: execute voting based intrusion

detection15: else // event is data packet arrival16: follow multipath routing protocol design to route

the data packet

SN Execution for Dynamic Redundancy Management

1: SN Execution:2: Get next event3: if event is TD timer then4: determine radio range to maintain CH connectivity

within a cluster5: else if event is control packet arrival from CH then6: change the optimal settings of TIDS and m7: else if event is Tclustering timer then8: perform clustering9: else if event is TIDS timer then10: for each neighbor SN11: if selected as a voter then12: execute voting based intrusion

detection13: else // event is data packet arrival14: follow multipath routing protocol design to route the

data packet

SCREENSHOTS

Source

Routing

Routing

Routing

Routing

Routing

Destination

Conclusion• A HWSN is maximized for reliability,

timeliness and security requirements ofquery processing applications in thepresence of unreliable wirelesscommunication and malicious nodes.

• The design of a dynamic redundancymanagement algorithm to identify and applythe best design parameter settings atruntime in response to prolong the systemlifetime. HWSN utilize multipath routing,used to minimize the energy consumptionand reduce the failure node and transfer theinformation in security manner.

Future work

For future work, we can explore more extensivemalicious attacks in addition to packet droppingand bad mouthing attacks, each with differentimplications to energy, security and reliability,and investigate intrusion detection andmultipath routing based tolerance protocols toreact to these attacks.

References• [1] Azzedine Boukerche, “Algorithms and protocols for wireless sensor networks” Willey, 2009.

• [2] W.Dargie,Ch.poellabauer,“Fundamentals of wireless sensor networks” Willey, 2010.

• [3] Ian F.Akylidiz, M. Can Vruan“Wireless sensor networks” Willey, 2010.

• [4] Ankita Joshi, Lakshmi Priya “A Survey of Hierarchical Routing Protocols in Wireless Sensor Network” NIT Hamirpur.

• [5] Kinjal Patel, Himanshu Arora, Pradeep Jha “Hierarchical routing protocol in wireless sensor network” IJATER.

• [6] Fiach Reid, “Network Programming in .NET” Elsevier Digital Press, 2004.

• [7] Hamid Al-Hamadi, Ing-Ray Chen, “Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks” IEEE paper, 2013.

• [8] P.Swaruba, K.Kumaresan,“Weighted voting based trust management for intrusion tolerance in heterogeneous wireless sensor networks.” International Journal of Computer Science and Management Research, 2013.

• [9] Daniel-Ioan Curiac, Constantin Volosencu, Dan Pescaru, Lucian Jurca, Alexa Doboli,“ Redundancy and Its Applications in Wireless Sensor Networks: A Survey” WSEAS.

• [10] B. Rachid , H. Hafid , K. Bouabdellah,“ A distributed approach using redundancy for wireless sensor networks reconfiguration” Oran Es-senia.

• [11] S. Mishra, A. Raj, A. Kayal, V. Choudhary, P. Verma, L. Biswal,“ Study of Cluster Based Routing Protocols in Wireless Sensor Networks” IJSER journal .

QUESTIONS?

top related