You are on page 1of 32

1

SECURING MULTI-PATH ROUTING USING TRUST


MANAGEMENT IN HETEROGENEOUS WIRELESS
SENSOR NETWORK

UNDER THE GUIDENCE OF


Dr. M. Sugumaran, Ph. D.,
PROFESSOR
DEPARTMENT OF CSE

Submitted by
S. Vaijayanthi
M. Tech(IS)
Objective of the project
2

 Redundancy management is enhanced to utilize multipath


routing for avoiding unreliable and malicious nodes.

 Voting based Intrusion Detection algorithm is applied to detect


compromised nodes.

 Data Aggregation protocol (SELDA) that ensures reliability


and security of the aggregated data in the presence of
compromised sensor nodes.
outline
3

 Introduction
 Existing system
 Related works
 Proposed system
 Modules
 Screen Shots
 References
Introduction
4

 Wireless Sensor Networks (WSNs):


 Highly distributed networks of small, lightweight wireless
nodes, Deployed in large numbers.
 Each of these sensor nodes collect data and transmit to the
sink using special routing protocols.
WSN: Sensing + Processing + Communication

 Heterogeneous sensor networks with two types of nodes: a small


number of powerful High-end sensors (H-sensors) and a large
number of Low-end sensors (L-sensors).

 Cluster is formed around each H-sensor.


Existing system
5

 Redundancy Management of Multi-Path routing for


intrusion tolerance is achieved by using two forms of
redundancy
-Source redundancy
-Path redundancy

 Voting based IDS algorithm is designed to maximize the


system lifetime of a HWSN.

 Geographic routing protocol is used to route the information


between nodes. Here no path information is maintained.
6

Figure 1: Source and Path Redundancy of heterogeneous WSNs


Source Redundancy means sensor node sensing a same zone are used
to forward sensing data to their Cluster Head (CH).

Path Redundancy by which paths are used to relay packets from the
source CH to the Processing Center (PC) through intermediate CHs.
ISSUES IN EXISTING SYSTEM
7

 Due to limited resource when a node is compromised, it performs two most


energy conserving attacks

BAD MOUTHING
Recommending a good node as bad node and a bad node as good node.
(when serving as a recommender)

Packet Dropping
Dropping the Packets when the data is transmitted in the network by
compromised nodes.

 Less security

 Energy consumption is not minimized


Proposed system
8
To strengthen Intrusion detection, Cluster based Trust
Management Protocol is developed. Here the sensor nodes
previous actions, like sensing , routing and availability is
monitored periodically.

 Secure and Reliable Data Aggregation(SELDA)


Here the sensor nodes and data aggregators generate a web
of trust by keeping reputation values. The reputation value of a
sensor node is computed using Beta distribution function.

 Multipath Data Aggregation


Local Path Discovery Algorithm is used to identify the
Local Path set within the neighbors.
Multipath routing
9

 It is used to improve data delivery in wireless sensor


networks.

 The probability of at least one path reaching the sink


node increases as we have more paths doing data
delivery.

 Use multiple paths in order to enhance network


performance
 Fault tolerance
 Energy-efficient
 Reliability
Multipath routing
10

Fault Tolerance
 Fault tolerance is the ability to sustain sensor network
functionalities without any interruption due to sensor node
failures.
 It is carried out in multipath routing because if any malicious
node is identified, then the data is traversed by means of
alternate path to the sink node
Intrusion Tolerance
 Individual nodes are not allowed to broadcast to the
entire network.

 Prevent advertisement of false routing data. Control


routing information must be authenticated.

 Redundant multipath routing is built into the system to


achieve secure routing

11
Framework for reputation learning
based aggregation
Aggregator
(AG)

Sensor nodes Cluster head Forward


AG’s ID announcement
(CH) final result

Update AG Reputation

Statistical Analysis Discount results based on


Update CH Reputation  Aggregation result • AG’s Opinion
 Calculate opinion • AG’s Reputation
 Update reputation
for sensors Update AG’s reputation

Update CH Reputation
SELDA Protocol
13

 It reduces the effect of compromised nodes on aggregated data


by using reputation values.

 The data of each sensor node is weighted based on its


reputation value with respect to the data aggregator, by
mitigating the effect of compromised nodes on the aggregated
data.
EG::Data aggregation
14
Algorithm RDA
15

Input: Data aggregator Aj, Aj 's neighboring nodes N1,N2, …Ni,


reputation value R1.j,R2,j,…. Ri.j of neighboring nodes with
respect to Aj .
Output: Aggregated data Dagg
Step 1: Aj observers each Ni periodically and updates the number of
false and correct actions by Ni.
Step 2: Aj updates Ri,j value of each Ni based on the updated number
of false and correct actions by Ni.
Step 3: Sensor nodes N1,N2,…Ni transmit data (D1,D2, …..Di) to Aj .
Step 4: Aj weighs data Di of each sensor node Ni using the reputation
value Ri,j .
Step 5: Aj aggregates the weighted data to obtain Dagg.
MULTIPATH ROUTING USING DAGG
16

 Compromised nodes may also disrupt the network traffic by


selectively forwarding or misdirecting packets.

 A secure multi path data transmission algorithm that ensures


secure data delivery to data aggregators.

 The proposed data transmission algorithm secretly selects


some paths based on the reliability of the paths and keeps the
quantity and identity of the selected paths secret.
EG: MULTIPATH TRANSMISSION
17
advantages
18

 Inside attacks can be avoided

 Energy consumption is minimized.

 Security and reliability is achieved.


Screen shots–Single path SCNEARIO
19
Sensing of data
20
Data Transmission through da
21
Multipath scenario
22
Data Transmission from DA 10 to DA 16
23
Identification of Compromised Nodes
24
Reliability of Aggregated Data
25
SELDA Protocol Reputation Value
26
Delivery Ratios
27
Energy Consumption with respect to individual transfer
rate of the node
28
Reference
29

1. O.Younis and S.Fahmy,“HEED: a hybrid, energy-efficient,


distributed clustering approach for ad hoc sensor networks,”
IEEE Transactions
2. E. Felemban , L.Chang-Gun, and E. Ekici, “MMSPEED:
multipath multi-SPEED protocol for QoS guarantee of reliability
and timeliness in wireless sensor networks”
3. J. Deng, R. Han, and S. Mishra , “INSENS: intrusion-tolerant
routing for wireless sensor networks,” Computer
Communication, vol. 29, no. 2, pp.216–230, 2006.
4. J. H. Cho, I. R. Chen, and P. G. Feng , “Effect of intrusion
detection on reliability of mission-oriented mobile group
systems in mobile ad hoc networks,” IEEE Transactions ,volume
59, no. 1, pp. 231–241, 2010.
30
5. J. H. Cho, I. R. Chen, and P. G. Feng, “Effect of intrusion
detection on reliability of mission-oriented mobile group systems
in mobile ad hoc networks,” IEEE Transactions, vol. 59, no. 1, pp.
231–241, 2010.

6. I.R.Chen, A.P.Speer, and M.Eltoweissy, “Adaptive fault-tolerant


QoS control algorithms for maximizing system lifetime of query-
based wireless sensor networks,” IEEE Transactions , Dependable
Secure Computing, vol. 8, no. 2, pp. 161–176, 2011.

7. Y. Lan , L.Lei, and G.Fuxiang, “A multipath secure routing


protocol based on malicious node detection,” in Proc. 2009
Chinese Control Decision Conference, pp. 4323–4328.

.
31
32

Thank you

You might also like