redundancy management in heterogeneous wireless sensor networks

24
REDUNDANCY MANAGEMENT IN HETEROGENEOUS WIRELESS SENSOR NETWORKS By: Saeid Hossein Pour lotomi Roll No: 12011D4026 Guide: Ms.E.Hemalatha

Upload: saeid-hossein-pour

Post on 15-Jul-2015

221 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Redundancy Management in Heterogeneous Wireless Sensor Networks

REDUNDANCY MANAGEMENT IN

HETEROGENEOUSWIRELESS

SENSOR NETWORKS

By: Saeid Hossein Pour lotomi

Roll No: 12011D4026

Guide: Ms.E.Hemalatha

Page 2: Redundancy Management in Heterogeneous Wireless Sensor Networks

• Introduction• Modules• Screenshots• Conclusion• Future work• References

Overview

Page 3: Redundancy Management in Heterogeneous Wireless Sensor Networks

Introduction

• WSNs are deployed in an unattendedenvironment.

• limited resources, a WSN must satisfy:i. QoS requirements and alsoii. minimize energy consumption

to prolong the system useful lifetime.• Tradeoff between energy consumption vs.

QoS gain with the goal to maximize the WSNsystem lifetime has been well explored in theliterature.

• No prior work exists to consider the tradeoffin the presence of malicious attackers.

Page 4: Redundancy Management in Heterogeneous Wireless Sensor Networks

The components of a sensor node

Page 5: Redundancy Management in Heterogeneous Wireless Sensor Networks

• In mathematics, a Voronoi diagram is a way of dividing space intoa number of regions.

What is Wireless Sensor Networks?

• WSN is composed of a large number of wireless sensors with low processing power and energy consumption for monitoring a certain environment

Page 6: Redundancy Management in Heterogeneous Wireless Sensor Networks

Modules

I. Attack ScenarioII. Compromised NodeIII. Redundancy ManagementIV. Dynamic Redundancy Management

Algorithm

Page 7: Redundancy Management in Heterogeneous Wireless Sensor Networks

Attack Scenario• All sensors are subject to capture attacks• Intrusion/fault Tolerance

Through multipath routing• Two most energy conserving attacks

I. Bad-mouthing attackII. Packet dropping attacks

Page 8: Redundancy Management in Heterogeneous Wireless Sensor Networks

Compromised Node• To detect compromised nodes, every node runs

a simple host IDS to assess its neighbors.• The IDS is light-weight to conserve energy. It is

also generic and does not rely on the feedbackmechanism tied in with a specific routingprotocol .

• It is based on local monitoring. That is, eachnode monitors its neighbor nodes only.

• To remove malicious nodes from the system, avotingbased distributed IDS is appliedperiodically in every TIDS (IDS interval time(sec)).

• It analyses the network by collecting sufficientamount of data and detects unusual behavior ofsensor node.

Page 9: Redundancy Management in Heterogeneous Wireless Sensor Networks

Redundancy Management

• Increase source or path redundancy enhancereliability , security. However, it also increasesthe energy consumption (system lifetime).

• Tradeoff between QoS vs. energy consumptionby using distributed IDS.

• Maximize life time of a HWSN(MTTF)

Page 10: Redundancy Management in Heterogeneous Wireless Sensor Networks

Algorithm for Dynamic Redundancy Management of multipath routing algorithm.

The objective of dynamicredundancy management is todynamically identify and apply thebest redundancy level in terms ofpath redundancy (mp) and sourceredundancy (ms), as well as thebest intrusion detection settings interms of the number of voters (m)and the intrusion invocationinterval (TIDS) to maximize MTTF.

Page 11: Redundancy Management in Heterogeneous Wireless Sensor Networks

CH Execution for Dynamic Redundancy Management.1: CH Execution:2: Get next event3: if event is TD timer then4: determine radio range to maintain CH connectivity5: determine optimal TIDS,m,ms,mP

6: notify SNS within the cluster of the new optimal settings of TIDS and m

7: else if event is query arrival then8: trigger multipath routing using mS and mP

9: else if event is Tclustering timer then10: perform clustering11: else if event is TIDS timer then12: for each neighbor CH13: if selected as a voter then14: execute voting based intrusion

detection15: else // event is data packet arrival16: follow multipath routing protocol design to route

the data packet

Page 12: Redundancy Management in Heterogeneous Wireless Sensor Networks

SN Execution for Dynamic Redundancy Management

1: SN Execution:2: Get next event3: if event is TD timer then4: determine radio range to maintain CH connectivity

within a cluster5: else if event is control packet arrival from CH then6: change the optimal settings of TIDS and m7: else if event is Tclustering timer then8: perform clustering9: else if event is TIDS timer then10: for each neighbor SN11: if selected as a voter then12: execute voting based intrusion

detection13: else // event is data packet arrival14: follow multipath routing protocol design to route the

data packet

Page 13: Redundancy Management in Heterogeneous Wireless Sensor Networks

SCREENSHOTS

Page 14: Redundancy Management in Heterogeneous Wireless Sensor Networks

Source

Page 15: Redundancy Management in Heterogeneous Wireless Sensor Networks

Routing

Page 16: Redundancy Management in Heterogeneous Wireless Sensor Networks

Routing

Page 17: Redundancy Management in Heterogeneous Wireless Sensor Networks

Routing

Page 18: Redundancy Management in Heterogeneous Wireless Sensor Networks

Routing

Page 19: Redundancy Management in Heterogeneous Wireless Sensor Networks

Routing

Page 20: Redundancy Management in Heterogeneous Wireless Sensor Networks

Destination

Page 21: Redundancy Management in Heterogeneous Wireless Sensor Networks

Conclusion• A HWSN is maximized for reliability,

timeliness and security requirements ofquery processing applications in thepresence of unreliable wirelesscommunication and malicious nodes.

• The design of a dynamic redundancymanagement algorithm to identify and applythe best design parameter settings atruntime in response to prolong the systemlifetime. HWSN utilize multipath routing,used to minimize the energy consumptionand reduce the failure node and transfer theinformation in security manner.

Page 22: Redundancy Management in Heterogeneous Wireless Sensor Networks

Future work

For future work, we can explore more extensivemalicious attacks in addition to packet droppingand bad mouthing attacks, each with differentimplications to energy, security and reliability,and investigate intrusion detection andmultipath routing based tolerance protocols toreact to these attacks.

Page 23: Redundancy Management in Heterogeneous Wireless Sensor Networks

References• [1] Azzedine Boukerche, “Algorithms and protocols for wireless sensor networks” Willey, 2009.

• [2] W.Dargie,Ch.poellabauer,“Fundamentals of wireless sensor networks” Willey, 2010.

• [3] Ian F.Akylidiz, M. Can Vruan“Wireless sensor networks” Willey, 2010.

• [4] Ankita Joshi, Lakshmi Priya “A Survey of Hierarchical Routing Protocols in Wireless Sensor Network” NIT Hamirpur.

• [5] Kinjal Patel, Himanshu Arora, Pradeep Jha “Hierarchical routing protocol in wireless sensor network” IJATER.

• [6] Fiach Reid, “Network Programming in .NET” Elsevier Digital Press, 2004.

• [7] Hamid Al-Hamadi, Ing-Ray Chen, “Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks” IEEE paper, 2013.

• [8] P.Swaruba, K.Kumaresan,“Weighted voting based trust management for intrusion tolerance in heterogeneous wireless sensor networks.” International Journal of Computer Science and Management Research, 2013.

• [9] Daniel-Ioan Curiac, Constantin Volosencu, Dan Pescaru, Lucian Jurca, Alexa Doboli,“ Redundancy and Its Applications in Wireless Sensor Networks: A Survey” WSEAS.

• [10] B. Rachid , H. Hafid , K. Bouabdellah,“ A distributed approach using redundancy for wireless sensor networks reconfiguration” Oran Es-senia.

• [11] S. Mishra, A. Raj, A. Kayal, V. Choudhary, P. Verma, L. Biswal,“ Study of Cluster Based Routing Protocols in Wireless Sensor Networks” IJSER journal .

Page 24: Redundancy Management in Heterogeneous Wireless Sensor Networks

QUESTIONS?