Download - Phase 2 Final Review
Node Categorization Node Categorization Algorithm Algorithm To Mitigate To Mitigate Packet Droppers and Packet Droppers and Modifiers InModifiers In Wireless Sensor Networks Wireless Sensor Networks
GUIDE BY
Dr.A.VALARMATHIAssistant professorDepartment of Computer ApplicationUniversity College of EngineeringBIT Campus,Tiruchirapalli.
PRESENTED BY
K.KALAIYARASAN
ABSTRACTABSTRACT Packet dropping and modification
are common attacks that can be launched by an adversary to disrupt communication in wireless multi-hop sensor networks.
Many schemes have been proposed to mitigate or tolerate such attacks but very few can effectively and efficiently identify the intruders.
EXISTING SYSTEM EXISTING SYSTEM
There is no checking of packet loss and finding the intruders.
It lacks physical protection and is subject to node compromise.
An adversary may launch various attacks to disrupt the
in-network communication.
Among these attacks, two common ones are dropping
packets and modifying packets.
PROPOSED SYSTEMPROPOSED SYSTEM
We propose a simple yet effective scheme to identify misbehaving forwarders that drop or modify packets.
Finally, most of the bad nodes can be
identified by our Two Ack Technique.
SOFTWARE AND HARDWARE REQUIREMENTSHARDWAREProcessor : PENTIUM IV 2.6 GHz, Intel Core
2 Duo Ram : 512 MB DD RAM
SOFTWAREFront End : JAVABack End : MS SQL 2005OS : Windows XP IDE : Netbeans
Architecture Diagram
Accepted By Sink
DroppedBy Sink
Original data send by Node 1
Sink
Sensor Node 2
Sensor Node 1
Sensor Node 3
Packet is dropped by Sensor Node - 3
Packet is modified and forwarded by Sensor Node -3
Packet is forwarded by Sensor Node-3
Wireless Sensor Network
Wireless Sensor Network
CONCLUSIONThe concept of adopting a hybrid scheme in AACK
greatly reduces the network overhead, but both TWOACK and AACK still suffer from the problem that they fail to detect malicious nodes with the presence of false misbehavior report and forged acknowledgment packets
Future EnhancementFuture EnhancementFurthermore, in an effort to prevent the attackers from
initiating forged acknowledgment attacks, we extended our research to incorporate digital signature in our proposed scheme. Although it generates more ROs in some cases, as demonstrated in our experiment, it can vastly improve the network’s PDR when the attackers are smart enough to forge acknowledgment packets
REFERENCESREFERENCES[1] Catching Packet Droppers and Modifiers in Wireless Sensor
Networks Chuang Wang, Taiming Feng, Jinsook Kim, Guiling Wang,
Member, IEEE, andWensheng Zhang, Member, IEEE
[2] Barak, B, Goldberg, S. and Xiao, D. (2008) ‘Protocols and lo r
bounds for failure localization in the internet’ in Eurocrypt.
[3] Bhuse,V, Gupta, A. and Lilien, L. (2005) ‘Dpdsn: Detection of packet
dropping’, RFC STD 3, 1123, Internet Engineering Task Force.
[4] Karlof, C. and Wagner, D. (2003), ‘Secure routing in wireless sensor
networks: attacks and countermeasures’, “in the First IEEE
International Workshop on Sensor network protocols and applications..