13
Mitigate Mitigate Packet Droppers and Packet Droppers and Modifiers In Modifiers In Wireless Sensor Wireless Sensor Networks Networks GUIDE BY Dr.A.VALARMATHI Assistant professor Department of Computer Application University College of Engineering BIT Campus,Tiruchirapalli. PRESENTED BY K.KALAIYARASAN

Phase 2 Final Review

Embed Size (px)

DESCRIPTION

project report

Citation preview

Node Categorization Node Categorization Algorithm Algorithm To Mitigate To Mitigate Packet Droppers and Packet Droppers and Modifiers InModifiers In Wireless Sensor Networks Wireless Sensor Networks

GUIDE BY

Dr.A.VALARMATHIAssistant professorDepartment of Computer ApplicationUniversity College of EngineeringBIT Campus,Tiruchirapalli.

PRESENTED BY

K.KALAIYARASAN

ABSTRACTABSTRACT Packet dropping and modification

are common attacks that can be launched by an adversary to disrupt communication in wireless multi-hop sensor networks.

Many schemes have been proposed to mitigate or tolerate such attacks but very few can effectively and efficiently identify the intruders.

EXISTING SYSTEM EXISTING SYSTEM

There is no checking of packet loss and finding the intruders.

It lacks physical protection and is subject to node compromise.

An adversary may launch various attacks to disrupt the

in-network communication.

Among these attacks, two common ones are dropping

packets and modifying packets.

PROPOSED SYSTEMPROPOSED SYSTEM

We propose a simple yet effective scheme to identify misbehaving forwarders that drop or modify packets.

Finally, most of the bad nodes can be

identified by our Two Ack Technique.

SOFTWARE AND HARDWARE REQUIREMENTSHARDWAREProcessor : PENTIUM IV 2.6 GHz, Intel Core

2 Duo Ram : 512 MB DD RAM

SOFTWAREFront End : JAVABack End : MS SQL 2005OS : Windows XP IDE : Netbeans

Architecture Diagram

Accepted By Sink

DroppedBy Sink

Original data send by Node 1

Sink

Sensor Node 2

Sensor Node 1

Sensor Node 3

Packet is dropped by Sensor Node - 3

Packet is modified and forwarded by Sensor Node -3

Packet is forwarded by Sensor Node-3

Wireless Sensor Network

Wireless Sensor Network

Modules

Key Generation & Tree Formation

Identify Packet Modifiers.

Identify Packet Droppers.

IMPLEMENTATION(SCREENSHOTS)

Screen shots

Screen shots

CONCLUSIONThe concept of adopting a hybrid scheme in AACK

greatly reduces the network overhead, but both TWOACK and AACK still suffer from the problem that they fail to detect malicious nodes with the presence of false misbehavior report and forged acknowledgment packets

Future EnhancementFuture EnhancementFurthermore, in an effort to prevent the attackers from

initiating forged acknowledgment attacks, we extended our research to incorporate digital signature in our proposed scheme. Although it generates more ROs in some cases, as demonstrated in our experiment, it can vastly improve the network’s PDR when the attackers are smart enough to forge acknowledgment packets

REFERENCESREFERENCES[1] Catching Packet Droppers and Modifiers in Wireless Sensor

Networks Chuang Wang, Taiming Feng, Jinsook Kim, Guiling Wang,

Member, IEEE, andWensheng Zhang, Member, IEEE

[2] Barak, B, Goldberg, S. and Xiao, D. (2008) ‘Protocols and lo r

bounds for failure localization in the internet’ in Eurocrypt.

[3] Bhuse,V, Gupta, A. and Lilien, L. (2005) ‘Dpdsn: Detection of packet

dropping’, RFC STD 3, 1123, Internet Engineering Task Force.

[4] Karlof, C. and Wagner, D. (2003), ‘Secure routing in wireless sensor

networks: attacks and countermeasures’, “in the First IEEE

International Workshop on Sensor network protocols and applications..