Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks

Full text

(1)

Adaptive and Channel-Aware Detection of Selective Forwarding

Attacks in Wireless Sensor Networks

G. Gangadhar

, K. Rammohan Rao, K. Ashok Babu

M.Tech in DECS, Sri Indu College of Engineering & Technology, Sheriguda, Ibrahimpatnam, RR.Dist. HYD Associate professor, Dept of ECE Sri Indu College of Engineering & Technology, Sheriguda, Ibrahimpatnam, RR.Dist. HYD

Professor & HOD Dept of ECE Sri Indu College of Engineering & Technology, Sheriguda, Ibrahimpatnam, RR.Dist. HYD

ABS TRACT: As a promising occasion monitoring and statistics gathering technique, wi-fi sensor network has been extensively carried out to each army and civilian packages. However, because of the lack of physical safety, sensor nodes are effortlessly compromised by using adversaries, making WSN at risk of various safety threats. One of the most intense threats is selective forwarding attack, where the compromised nodes can maliciously drop a subset of forwarding packets to become worse the records delivery ratio of the community. In this assignment, we propose a Channel-conscious Reputation System with adaptive detection threshold to hit upon selective forwarding attacks in WSNs. The CRS-A evaluates the information forwarding behaviors of sensor nodes, in keeping with the deviation of the monitored packet loss and the expected ordinary loss and it optimizes the detection accuracy.

INTRODUCTION:

A wireless sensor community (WSN) consists of sensor nodes able to gathering statistics from the environment and communicating with each different via wireless transceivers. The collected records will be brought to 1 or greater sinks, generally thru multi-hop conversation. The sensor nodes are typically expected to function with batteries and are often deployed to not-effortlessly-reachable or opposed environment, now and again in massive quantities. It can be difficult or impossible to replace the batteries of the sensor nodes. On the opposite hand, the sink is generally wealthy in

electricity. Since the sensor power is the most

valuable resource within the WSN, efficient utilization of the energy to extend the network lifetime has been the focal point of a great deal of the studies on the WSN. The communications within the WSN has the various-to-one assets in that records from a big wide variety of sensor nodes have a tendency to be concentrated into a few sinks. Since multi-hop routing is commonly needed for remote sensor nodes from the sinks to shop strength, the nodes close to a sink can be harassed with relaying a big quantity of traffic from other nodes.

(2)

amassing sensor community, at the same time as alternatively sleep-wake synchronization is the important thing problems for event detection sensor networks.

Algorithm:

1) Initialize the Hello timer 2) If Hello timer expires

a. Send hello message

3) If node has data

a. If coop checking not yet over

i. Get the random neighbor from table

ii. Send the req to the neighbor node

b. Else

i. Send the req to destination

4) If packet received

a. If the packet is hello packet i. If sender is not malicious

1. If node is unknown node

a. Add details in

table

2. Else

a. Update the expire

time

ii. Else

1. Ignore the packet

b. If packet is Req packet

i. Do basic packet filtering and

updating operation

ii. If current node is destination && sender is neighbor

1. Set packet as Freq

2. Ignore the packet

iii. If current node is

malicious node

1. Send reply

iv. If node is destination

1. Send reply

c. If packet is reply packet

i. If current node is destination of reply packet && source is neighbor

1. Set packet final node is

malicious

2. Ignore the packet

ii. Else

1. Do normal filtering and

updating operation

Enhanced Algorithm:

1. If packet is data type

a. Data transfer to the shortest path

b. Initialize π‘‡π‘Ÿπ‘’π‘ π‘‘ = 1.000 for every nodes in a find path

c. Check per every hop count (π‘‡π‘Ÿπ‘’π‘ π‘‘ =

𝑅π‘₯/(𝑇π‘₯ βˆ— 100))

d. Calculated value update to Rtable (

π‘‡π‘Ÿπ‘’π‘ π‘‘ π‘ˆ π‘…π‘‘π‘Žπ‘π‘™π‘’)

i. If π‘‡π‘Ÿπ‘’π‘ π‘‘ < 0.75 && < 0.25

Update node detail into malicious list

a)Break link

i. generate RREQ to find ne w route without hacker

ii.once again data transfer in another route

ii. Else transfer regular data

BLOCK DIAGRAM:

(3)

PACKET ARRIVAL Software System Attributes

Security is provided using password protection, release when time out etc., by using these technologies the system is made more secure and more authentic.

PACKET TRANSMISSION

1. Availability

Availability requirements are to identify the true end users of the system, analyze the impact of the service availability on the end user. Specify availability requirements that directly reflect what the end user requires to accomplish their business objectives.

2. Security

Security protection of computer based resources includes hardware, software, data, procedures and people against unauthorized use or natural disaster is known as system security.

3. Maintainability

Maintainability of the system will be designed as a closed system. New methods can be added easily with little or no changes in the existing architecture.

4. Reusability

The writing of help files is an out-of-band development item – it is not completed by the development team. Further it cannot be commenced until the system design is complete and screen layout and design are known.

5. Other Requirements

Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance requirements, quality standards, or design constraints).

BS

Data unit

Routing manager

Energy comp

Node list

Timer

Data unit

ger

(4)

This screen shorts shows that error in 79th line in file

1.tcl, while writing the program, we have to solve this type of problem

Expected Outcomes:

The resilience and scalability of TARF will prove through both extensive simulation and empirical evaluation with large-scale WSNs; the evaluation involves static and mobile settings, hostile network conditions, as well as strong attacks such as wormhole attacks and Sybil attacks.There are two results we will show in final time that is Nam window and xgraph.In Nam window, we will show the event which are going to happen in our network environment as animation part.

NAM window

Conclusion:

In this paper, we've proposed a channel-aware popularity machine with adaptive detection threshold (CRS-A) to stumble on selective forwarding assaults in WSNs. To correctly distinguish selective forwarding assaults from the regular packet loss, CRS-A evaluates the forwarding behaviors by way of the deviation between the estimated regular packet loss and monitored packet loss.

Using xgraph we will show our theoretical result for provide the proof record.

To improve the detection accuracy of CRS-A, we have similarly derived the most suitable assessment threshold of CRS-A in a probabilistic manner, that's adaptive to the time-various channel condition and the assault possibilities of compromised nodes.In addition, a distributed and attack-tolerant statistics forwarding scheme is evolved to collaborate with CRS-A for stimulating the cooperation of compromised nodes and enhancing the records transport ratio. Our simulation consequences display that the proposed CRS-A can attain a excessive detection accuracy with low fake and overlooked detection possibilities, and the proposed assault-tolerant statistics forwarding scheme can enhance extra than 10% statistics transport ratio for the community. In our future paintings, we are able to extend our investigation into WSNs with cellular sensor nodes, where the detection of selective forwarding assaults turns into more tough, because the regular packet loss rate is greater fluctuant and hard to estimate due to the mobility of sensor nodes.

(5)

[1] I. Butun, S. Morgera, and R. Sankar, β€œA survey of intrusion detection systems in wireless sensor networks,” IEEE Commun. Surv. & Tutor.,vol. 16, no. 1, pp. 266–282, 2014.

[2] Y. Zou, X. Wang, and W. Shen, β€œPhysical-layer security with multiuser Scheduleng in cognitive radio networks,” IEEE Trans. Commun., vol. 61, no. 12, pp. 5103–5113, 2013.

[3] B. Xiao, B. Yu, and C. Gao, β€œChemas: Identify suspect nodes in selective forwarding attacks,” J. Parallel Distributed Comput., vol. 67, no. 11, pp. 1218–1230, 2007.

[4] Y. Zhang, L. Lazos, and W. Kozma, β€œAmd: Audit-based misbehavior detection in wireless ad hoc networks,” IEEE Trans. Mob. Comput., prePrints, published online in Sept. 2013.

[5] S. Ozdemir, β€œFunctional reputation based reliable data aggregation and transmission for wireless sensor networks,” Comput. Commun., vol. 31, no. 17, pp. 3941– 3953, 2008.

[6] D. Hao, X. Liao, A. Adhikari, K. Sakurai, and M. Yokoo, β€œA repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks,” Comput. Commun., vol. 35, no. 17, pp. 2125– 2137, 2012.

[7] X. Liang, X. Lin, and X. Shen, β€œEnabling trustworthy service evaluation in service-oriented mobile social networks,” IEEE Trans. Parallel Distr.Sys., vol. 25, no. 2, pp. 310–320, 2014.

[8] J. Ren, Y. Zhang, K. Zhang, and X. Shen, β€œSacrm: Social aware crowd- sourcing with reputation management in mobile sensing,” Computer Commun., vol. 65, no. 15, pp. 55–65, 2015.

[9] L. Yu, S. Wang, K. Lai, and Y. Nakamori, β€œTime series forecasting with multiple candidate models: selecting or combining,” J. Sys. Sci. Complexity, vol. 18, no. 1, pp. 1– 18, 2005.

[10] J. Ren, Y. Zhang, K. Zhang, and X. Shen, β€œExploiting channel-aware reputation system against selective forwarding attacks in wsns,” in Proc. IEEE GLOBECOM, 2014, pp. 330–335.

[11] S. Djahel, F. Nait-Abdesselam, and Z. Zhang, β€œMitigating packet dropping problem in mobile ad hoc networks: proposals and challenges,” IEEE Commun. Surv. & Tutor., vol. 13, no. 4, pp. 658–672, 2011.

[12] K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, β€œAn acknowledgment-based approach for the detection of routing misbehavior in manets,” IEEE Trans. Mob. Comput., vol. 6, no. 5, pp. 536–550, 2007.

G. GANGADHAR1, Pursuing M.Tech

in DECS, Sri Indu College of Engineering & Technology, Sheriguda,

K. RAMMOHAN RAO2,

Currently working as Associate

professor, Dept of ECE, Sri Indu College

of Engineering & Technology,

Sheriguda,

K. ASHOK BABU3,

Currently working as professor

Figure

Updating...

References

Updating...

Download now (5 pages)
Related subjects : WSN Applications