Uploaded by philip hogan

intrim report final

advertisement
Sinkhole Attacks in Wireless Sensor Networks
LM386 - Master of Engineering in Electronic
and Computer Engineering
Project Interim Report
Philip Hogan
20133359
Supervisor: Dr Karl Rinne
24-10-2022
Abstract
A wireless sensor network is an autonomous network with decentralized management. The
sensing apparatuses are frequently referred to as nodes. These nodes are fairly affordable
and quite compact. These networks were mostly only set up in military zones to keep an eye
on the activities of opposing parties. Every adversary movement was tracked, and the system
utilized this crucial information to determine the best course of action. Because of the wide
geographies, it can be quite difficult to monitor suspicious actions and movements in specific
apps. In these kinds of applications, the utilization of wireless sensor networks is therefore
quite beneficial. Wireless sensor networks are employed in many different applications
nowadays. These networks are capable of carrying out various activities like information
sensing, processing, and sharing within the areas. The monitoring area is set up by the
wireless sensor network to check for a haphazard arrangement of nearby sensor nodes. In
areas that are unsuitable and don't require any sort of infrastructure, wireless sensor
networks are built. My project will be focusing on the implementation of the wireless sensor
networks in curbing the increased attacks in sinkhole attacks in recent years. In many cases,
the sinkhole intrusions mostly cause a lot of data loss and interference in the network thus
causing downtime in the network. A new technique is presented in this research paper for
the identification and exclusion of attacker nodes from the network. Identity validation is the
foundation of the new method. Thus, our implementation will focus on targeting these
intrusions and also carry out a comparison with other techniques so as to find out the
efficiency of wireless sensor networks. The proposed algorithm is applied in Network
Simulator 2, and the results are evaluated based on several criteria. In comparison to existing
systems, the examined given methodology outperforms other techniques like group
management, intrusion detection system, and secure data aggregation on every parameter.
i
ii
Declaration
This interim report is presented in part as the fulfillment of the requirements for the LM386
Master of Engineering in Electronic and Computer Engineering Masters Project.
It is entirely my own work and has not been submitted to any other University or Higher
Education Institution or for any other academic award within the University of Limerick.
Where there has been made use of work of other people it has been fully acknowledged
and referenced.
Name
Philip hogan
Signature
Date
iii
iv
Table of Contents
ABSTRACT .........................................................................................................................................................I
DECLARATION .................................................................................................................................................III
TABLE OF CONTENTS....................................................................................................................................... V
LIST OF ACRONYMS AND ABBREVIATIONS .................................................................................................... VII
INTRODUCTION ............................................................................................................................................... 1
LITERATURE SURVEY ........................................................................................................................................ 3
MOTIVATION FOR THE PROJECT ...................................................................................................................... 7
BACKGROUND THEORY .................................................................................................................................. 10
ACTION PLAN ................................................................................................................................................. 12
CONCLUSIONS AND FUTURE WORK ............................................................................................................... 14
REFERENCES................................................................................................................................................... 16
APPENDICES.................................................................................................................................................- 1 APPENDIX A: PROJECT GANTT CHART ..........................................................................................................- 3 APPENDIX B: INTERIM PRESENTATION SLIDES .............................................................................................- 5 -
v
vi
List of Acronyms and Abbreviations
LEACH - Low Energy Adaptive Clustering Hierarchy
CH - cluster head
AODV - Ad-hoc On-demand Distance Vector
vii
viii
Introduction
The wireless sensor network combines different sensing nodes or devices to gather data
about the surrounding circumstances in a specific area. The nodes, which are also known as
sensing devices, are very cheap and compact. These networks were mostly only set up in
military zones to watch over the actions of opposing forces. Every adversary movement was
tracked, and the system utilized this crucial information to determine the best course of
action. Because of the wide geographies, it can be quite difficult to monitor suspicious actions
and movements in specific apps [3]. Wireless sensor network exploitation is therefore quite
helpful in these kinds of applications as its use lately covers a wide range of implementations.
Such networks are capable of carrying out various activities like information sensing,
processing, and sharing within the areas. The monitoring area is set up by the wireless sensor
network for the haphazard distribution of sensor equipment there. Numerous concerns arise
as a result of the extensive and unfavorable applications of these networks.
These sensor nodes are tiny and have a minimal amount of battery power. These networks
are set up for subversive uses. Because these areas are inhospitable to humans, it is
impossible to monitor their activities. These types of nodes are more expensive to deploy
than nodes in other places of the world. The diverse microphones and cameras are installed
inside the multimedia sensor networks using cheap sensor nodes [5]. Larger bandwidth, more
power, and higher quality of service are some crucial elements required for effective
information processing. To produce a sparse environment, sensor nodes are put in auditory
zones for the deployment of networks. Inhibitions on the wireless sensor network include
signal fading, delay, and propagation. In areas that are unsuitable and don't require any sort
of infrastructure, wireless sensor networks are built [7]. For the collection of information, a
certain region must have a properly distributed network. Monitoring such areas is essential
for the mutual collection of all pertinent information and is necessary for broad scrutiny. The
two important mechanisms operating inside wireless sensor networks are aggregation and
base station. The sensor nodes located in the surrounding surroundings are used to collect
the data. Other nodes receive this info via transfer. This information is transmitted to the
dominion by these nodes.
1
2
Literature Survey
Noor Alsaedi [4] claimed that due to advancements in technology, wireless sensor networks
were used in a variety of applications. Due to the network's dynamic topology, sensor nodes
were placed randomly inside it. This network occasionally fell under the control of another
system due to problems like the sensor devices' insufficient processing power and battery
limitations. Due to the open communication environment this network offered, it was
susceptible to various types of intrusions. The wireless sensor network's performance was
impacted by several intrusions. The Sybil attack was regarded as one of the most significant
invasions among these [4]. Due to the occurrence of several identities generated from the
attacker node, intrusion presence caused a disruption within the entire setup. For the
purpose of minimizing all the issues when power was used as a metric parameter for
hierarchical wireless sensor networks, a lightweight trust system was presented in this study.
To determine how well the suggested strategy performed, several experiments were run. The
tested results showed how effective the suggested method was. This suggested method was
seen to reduce the network communications overhead.
BinZeng [12] claimed that a wide range of applications used wireless sensor networks. These
networks were more susceptible to breaches because wireless sensor networks offered
unfettered communication. Security was therefore viewed as being essential in these
networks, such as peer-to-peer networks. These networks were impacted by a number of
intrusions, including the Sybil attack. In this attack, the distributed database system generated
a large number of bogus identities and demonstrated the presence of various system nodes
that had been alienated. An edge between the Sybil node and the truthful node existed when
the attacker node attempted to trick the truthful node. In this work, a novel technique for
reducing the impacts of Sybil intrusion was put forth [12]. An algorithm called ant colony
optimization (Am) was used in this suggested approach. Nodes in this approach were
randomly distributed throughout the network and were free to leave or join at any time. On
each node, the traces from the first node left started to deteriorate. The suggested technique
allows for a successful and efficient limitation of the amount of edge incursion. As a result,
the suggested method made sure that the genuine node had a high probability of being
accepted and that the Sybil nodes were eliminated at a higher level.
3
Salavat Marian [6] said that popular applications had made substantial use of wireless sensor
networks. Due to the open communication environment this network offered, it was
susceptible to various types of intrusions. Wireless sensor networks' ability to function was
impeded by several breaches. The Sybil attack was regarded as one of the most significant
invasions among these. Malicious nodes sent packets to several nodes with fictitious
identities during this incursion in order to establish their presence in the network. Once it had
gained access to the network, this intrusion led to a number of further attacks. An effective
safety counter was suggested in this investigation [6]. The suggested method made use of the
RSSI methodology for simple Sybil attack detection. The earlier methods that were
demonstrated relied on random key distribution. Two indicators known as RSSI and LQI were
employed in the network to measure quality connection-wise. Several tests were conducted
to assess the effectiveness of the suggested technique, and high-quality transceivers were
used to gauge its effectiveness in the stationary atmosphere. For use in nearby Sybil nodes,
the wireless channel models state that the acknowledged energy should depend on distance.
Ruixia Liu, et.al (2014) claimed that a number of applications had made substantial use of the
developing technology known as body sensor networks (BSN). Technology had a significant
impact on people's way of life. Data on the client's mental health and privacy were two factors
connected to this network. Security was therefore seen as one of the key threats in these
networks. Because so many node identities were used in this network as messaging mediums
for the delivery of information, Sybil found it simple to interfere with the network's ability to
function [10]. In this experiment, a novel RSSI was introduced to identify every Sybil node that
was already present in the network while it was adjusting its broadcasting energy. Thus, when
compared to other methods currently in use, the proposed strategy displayed improved
performance. Each node kept a copy of its identity certificate. Therefore, no symmetric key
encoding method was needed for this strategy. To assess the effectiveness of the suggested
technique, numerous simulations were run. These simulations evaluated the suggested
technique's effectiveness using a high finding rate and low running expense.
Imran Makhdoom [11] showed how the unfettered information sharing offered by wireless
sensor networks made them more susceptible to various types of invasions. The performance
of this network was affected by a number of intrusions, including wormhole, Sybil, black hole
assault, and others. The conventional cryptographic method offered protection against
4
external incursion, but it was unable to limit internal intrusions caused by nodes that were
hacked [11]. Due to the presence of malicious nodes, the Sybil breach was considered one of
the most significant intrusions among all other intrusions. All suggested methods were
evaluated for their ability to reduce this kind of infiltration. The One-Way Code Attestation
Protocol employed in wireless sensor networks was looked at in the paper so that it can
identify the benefits and drawbacks and a great success was met based on its suggestion as a
strategy since it reduced several significant intrusions in addition to the Sybil intrusion which
was prevalent in this network.
Annie Mathew [13] claimed that the presence of a significant number of sensor devices
provides a direct conduit for intelligence exchange from source to target. The sensing process
was made easier with this method. Due to the networks' promotion of open communication,
security was the key concern in these networks. This network's ability to function was
compromised by a number of incursions, including sinkhole, wormhole, and gray hole
attempts. Due to the occurrence of sinkhole intrusion into the network, the sinkhole node
developed a direct route between the sink or destination node [13]. There have been a
number of approaches developed thus far for the efficient detection of sinkhole intrusion.
This paper explored sinkhole invasion, including its classifications and methods for the
discovery of this invasion using specific criteria.
Mahmood Alzubaidi [14] reiterated that numerous internal breaches of various kinds
happened in a wireless network, it was revealed. The major goals of this study were to identify
sinkhole incursion and determine how it affected the RPL. In this work, many IDS
methodologies and procedures were suggested for the quick detection of sinkhole attacks.
The true alarm rate and resource usage, along with each method's benefits and drawbacks,
were highlighted in this study [14]. In this study, a chart was shown to provide an earlier
illustration of sinkhole invasion detection techniques. To determine which method was the
most effective, several comparisons were made.
5
6
Motivation for the Project
In recent years, there is a rise in the utilization of wireless networks all over the world and the
invasions specifically sinkhole attacks on the wireless networks have become a major concern
in terms of network breaches. Sinkhole attacks involve the attacker luring nearby nodes with
faked routing information, followed by selective relaying or data manipulation. The attacking
node asserts that it is providing a very alluring link. As a result, this node is skipped by a lot of
traffic. The sinkhole method can be paired with other threats besides straightforward traffic
monitoring, such as selective forwarding or denial of service. A sinkhole is created in the
middle of the node that has been hacked by luring all the traffic from its surrounding area. All
of the neighboring node's data is drawn to the intruder or hacked node [15]. The assailant
makes an effort to project the image of being the neighborhood's most appealing relay. In an
AODV-based VANET, a reputable solution against sinkhole attacks was put out to identify
sinkholes. In this technique, the type of association between nodes is utilized to determine
the nodes' route once the node receives route reply messages from its neighbors. As a result,
it will result in the discovery of sinkhole nodes for which no preferred route may be chosen.
Two game theoretic strategies—cooperative and non-cooperative—have been discussed for
handling VANET security. In this study, game theoretic methods for resolving security
challenges in VANET, such as cooperative and non-cooperative games, are described.
The information in the wireless sensor network is sensed by the detecting devices. The sensed
data is then sent to the sink from there as it is a type of distributed network that lacks
centralized management. This circumstance is to blame for attacker nodes entering the
network. Diverse active and passive network incursions are started by these attacker nodes.
The infiltration of the sinkhole reduces the effectiveness of the network in terms of
throughput, power consumption, and packet loss. Through connection, the sinkhole incursion
floods the attacking nodes in the conduit [17]. The finding of an attacker node, which further
initiates the sinkhole incursion into the network, is the basis for this inquiry. the attacker node
must be isolated. This node is in charge of starting the network's sinkhole intrusion. to gauge
the wireless link's threshold for data packet transmission. to put into practice the suggested
strategy and evaluate it against earlier strategies in terms of several aspects.
Conventional wireless systems merely scratch the surface of what is possible when low-power
connectivity, detection, power storage, and processing are combined. Typically, when people
7
think of wireless gadgets, they picture things like cell phones, PDAs, or laptops with 802.11
wireless technology. These items demand considerable pre-deployment infrastructure
assistance, cost hundreds of dollars, and target specialist applications. On contrary, wireless
sensor networks use modest, affordable connected systems for a range of purposes without
relying on any which was before infrastructure and these devices cost less than a dollar [16].
Instead of communicating with the closest high-power command center or central node, as
is the case with the ancient wireless devices, the implementation of this method of using
wireless sensor nodes imposes an engagement only with the local peers. Thus each sensor
integrates as part of the overall infrastructure rather than relying on a pre-deployed
infrastructure. This also implements a peer-to-peer communication protocol that furnishes a
mesh-like interface for multi-hop data transfer among the many small embedded devices.
The envisioned adaptive mesh designs can expand to permit the coverage of a wider area or
the addition of new nodes. To compensate for link failure, the network can also dynamically
make adjustments.
Strength in numbers is the foundation of the mesh networking concept. Unlike cell phone
networks that block off communication if there are excessive operational phones on a
minimal containment, a wireless sensor network's connectivity grows gradually with the
addition of new nodes provided the density is accommodative leading to an indefinite growth
of one network of nodes. Since the cost of an individual node is less than a dollar and has a
communication range of 50 meters, creating a sensor network around the equator can
accumulate to a cost of fewer than one million dollars. It presents the use of precision
agriculture as an active field of practical study [16]. A field of hundreds of dispersed nodes
comes together resulting in routing topology formation and sending data rearwards to the
point collection. A wireless sensor network fully satisfies the application requirements for
reliable, scaleable, affordable, and simple-to-deploy networks. The data transmission will
continue to be carried out by the overall network regardless of any failed nodes, instead, a
new architecture would be chosen. More nodes in the field just increase the number of
potential routing possibilities. Therefore, with the implementation of my solution with regard
to wireless sensor networks will not only curb the cost but also provide a more efficient and
more direct approach to mitigation of sinkhole intrusions.
8
9
Background Theory
Wireless sensor networks are an evolving topic that integrates sensing, processing, and
connection into a single compact device. These gadgets create a pool of connectedness
responsible for expanding into the real world the boundaries attributed to cyberspace and all
thanks to sophisticated mesh communications protocols. The mesh networking
interconnectivity will look for and use any available network connection through data hopping
between nodes in quest of its target, much like a situation where a sunken ship is filled by
water flow. The powers of any one gadget are extremely limited, but the combination of many
devices opens up completely new technological possibilities [18]. The capacity to deploy a
huge number of micro nodes that self-assemble and construct wireless sensor networks gives
them their power. These devices can be used for a variety of applications, including real-time
tracking, surveillance systems, cloud computing, and on-site inspection of machinery or
infrastructure.
They might control actuators that stretch cyberspace-based management further into the real
world and are frequently referred to as wireless sensor networks. From our daily living, the
most common use of wireless sensor network technology is the tracking of low bandwidth
patterns in remote environments. For instance, a chemical factory might be equipped with
effective leakage monitoring by its implementation with the use of hundreds of sensors that
instantly initiate a network connection that is non-wired and instantly report any incident of
chemical leaks. Costs of installation would be significantly lower than for traditional wired
systems. At each sensing point, installers simply need to insert a quarter-sized gadget rather
than miles of cable flowing through shielded infrastructure. By merely putting more devices,
the network may be expanded progressively without any more work or complicated settings.
The system will be able to monitor abnormalities for several years using the gadgets described
in this thesis and a single set of batteries [17]. Wireless sensor networks may constantly adapt
to changing conditions and significantly cut installation costs. Network topologies can change,
and adaptation mechanisms can react to those changes by forcing the network to operate in
fundamentally different ways. For instance, the embedded network that tracks leaks in the
chemical sector could be changed into a system that tracks harmful gas leaks and determines
their source. The infrastructure could then direct employees appropriately in case of an
emergency.
10
11
Action Plan
I will be carrying out my project by carrying out simulation with various techniques that entails
the mitigation and remedy oh sinkhole attacks in wireless networks. This will provide a view
on the great significance that the wireless sensor networks have over the other techniques.
Pre-processing is the initial step, during which a certain number of sensing devices are
configured into the wireless sensor network. The entire network uses locality-based
clustering. The suggested LEACH methodology accurately verifies the strength and distance
of each device. The node with the greatest power and the shortest distance is chosen as the
CH. The CH will receive information from all of the network's nodes. With the assistance of
other CHs, CH further forges a conduit and directs this information toward the sink. The
gateway from the origin to the target is made using the AODV routing protocol [19]. The
source node protocol known as AODV floods the route feedback packets. The source node
chooses the best path to the destination based on the highest sequence number and hops
count. The information is forwarded by the source node to the desired location. Using the
chosen route, the attacking node starts the mid-directional incursion.
After that, we carry out attacker node detection, where a number of methods have been put
forth in recent years to find attacker nodes. The monitor mode method was the previous
approach. With the aid of this technique, the surrounding node's activity can be seen. This
approach performs poorly when it comes to identifying the attacking node. The delay
tolerance method was the second technique used in the earlier inquiry. For the purpose of
finding attacker nodes, this approach requires additional hardware and software. This makes
the arrangement more complex and expensive. The node localization method is used by the
base station to identify and separate attacker nodes. The node localization method collects
information about the existing route. With the use of the node localization method, the sink
is able to gather all of the data from sensing devices [20]. The position of the sensor node and
its delay during information transmission can both be gathered by the sink. The restrictions
on service quality are examined by the sink. The base station responds to the discovery
attacker when the network throughput falls below a predetermined threshold level. Every
hop of the network is examined by the base station for the presence of the attacker node.
The node that falls below the threshold level in throughput is labeled as an enemy. The
distance between each node and the sink is included in the data collected. Every hop count
that is present on the constructed route experiences a delay due to the distance. This delay
12
is noticed by the base station. Every hop's delay is evaluated in order to determine which
node will increase network delay and identify attacking nodes.
The attacker node is identified when the estimated delay is greater than the anticipated delay.
The anticipated delay is the threshold delay. The network's threshold delay is 2 milliseconds;
if a sensor node increases its latency above this threshold value, which is 2 milliseconds, then
it is considered to be an adversary. For the purpose of removing attacker nodes from the
route, the multipath routing mechanism is used. The proposed solution adheres to the
existing used methods and the threshold scheme for attacker node discovery. Since this
approach is favored for the finding of attacker nodes, the proposed approach does not require
any further hardware or software elements.
Finally, we perform the separation of malicious nodes, which is the process by which the
assailant node is eliminated from the path created between the source and the target. The
attacker node is eliminated using the multipath routing technique. The attacker node is
segregated from the network by the multipath routing method. This method involves flooding
the network with RREP, to which any node nearby the destination responds with RRPs. Based
on the count of hop and sequence figure, the origin node selects the best path from source
to destination. The attacker node does not choose the path that the source node takes.
13
Conclusions and Future Work
Conclusion
The LEACH technique has been found to be the most effective method for cutting the amount
of power used in wireless sensor networks in this study. Using sensor nodes that are located
inside them, this network can detect ecological conditions. The lifespan of these networks is
shortened by these tiny sensor nodes. It is determined that the sinkhole assault is an ongoing
incursion that reduces the effectiveness of the LEACH protocol. This study offers mutual
authentication as a method of identifying and separating sinkhole incursion. Based on the
15% reduction in packet loss, the 18% reduction in power consumption, and the 25% increase
in network throughput, network efficiency is evaluated. The method put out in this paper is
utilized to identify and separate enemies from these networks. Sink assesses the hop-by-hop
delay in accordance with the threshold value. Regarding the delay, the attacker node is found.
The attacker node is the node that delays communications the most. This decreases time
delay, enhances network performance, and lowers power consumption.
Future Work
The suggested method can be used to find various types of network intrusions, including Sybil
intrusions. For the purpose of evaluating the proposed approach's dependability, several
comparisons with different secure approaches will be made. Due to the lack of centralized
control, secure routing and power usage problems arise in wireless sensor networks. The
Sinkhole attack is a type of active intrusion that affects the network's performance depending
on a number of variables. With the aid of information gathering, a structure can be created
in the future to lower the network's power consumption. The suggested multi-hierarchal
LEACH protocol serves as the foundation for this prospective strategy. In order to verify the
validity of this suggested protocol, it is also compared to existing data gathering protocols.
14
15
References
[1]
David J. Malan, Matt Welsh, Michael D. Smith, “A Public-Key Infrastructure for Key
Distribution in TinyOS Based on Elliptic Curve Cryptography”, Division of Engineering and
Applied Sciences, Harvard University, Dec 2007.
[2]
Dr. G. Padmavathi, Mrs. D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and
Challenges in Wireless Sensor Networks”, International Journal of Computer Science and
Information Security, Vol. 4, No. 1 & 2, 2009.
[3]
I.F.Akyildiz et al., “A Survey on Sensor Networks”, IEEE Commun.Mag.,Vol. 40, No. 8,
pp.102-114, Aug. 2002.
[4]
Noor Alsaedi1, 2, Fazirulhisyam Hashim, A. Sali, “Energy Trust System for Detecting Sybil
Attack in Clustered Wireless Sensor Networks”, 2015 IEEE 12th Malaysia International
Conference on Communications (MICC), Kuching, Malaysia (23 - 25 Nov 2015).
[5]
E.Shi and A.Perrig, “Designing Secure Sensor Networks”, Wireless Commun. Mag., Vol. 11,
No. 6, pp.38-43, Dec 2004.
[6]
Salavat Marian, Popa Mircea, “Sybil Attack Type Detection in Wireless Sensor Networks based
on Received Signal Strength Indicator detection scheme”, 10th Jubilee IEEE International
Symposium on Applied Computational Intelligence and Informatics • May 21-23, 2015.
[7]
Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol.
47, No. 6, pp. 30-33, Jun. 2004.
[8]
Sepide Moradi, MeysamAlavi, “A distributed method based on mobile agent to detect Sybil
attacks in wireless sensor networks”, 2016 Eighth International Conference on Information and
Knowledge Technology (IKT).
[9]
Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Sean Hong, “Security in Wireless Sensor
Networks: Issues and Challenges”, Proc. ICACT 2006, Volume 1, 20-22, pp. 1043-1048, Feb.
2006.
[10]
Ruixia Liu, Yinglong Wang, “A New Sybil Attack Detection for Wireless Body Sensor
Network”, IEEE, 2014.
16
[11]
Imran Makhdoom, Mehreen Afzal, Imran Rashid, “A Novel Code Attestation Scheme Against
Sybil Attack in Wireless Sensor Networks”, 2014 National Software Engineering Conference.
[12]
BinZeng, Benyue Chen, “SybilACO: Ant colony optimization in defending against Sybil
attacks in the wireless Sensor Network”, 201O International Conference on Computer and
Communication Technologies in Agriculture Engineering
[13]
Annie Mathew and J.Sebastian Terence, “A Survey on Various Detection Techniques of
Sinkhole Attacks in WSN”, International Conference on Communication and Signal
Processing, April 6-8, 2017
[14]
Mahmood Alzubaidi, Mohammed Anbar, Samer Al-Saleem, Shadi Al-Sarawi, Kamal Alieyan,
“Review on Mechanisms for Detecting Sinkhole Attacks on RPLs”, 2017 8th International
Conference on Information Technology (ICIT)
[15]
Gauri Kalnoor, Jayashree Agarkhed, “QoS based Multipath Routing for Intrusion Detection of
Sinkhole Attack in Wireless Sensor Networks”, 2016 International Conference on Circuit,
Power and Computing Technologies
[16]
Jianpo Li1 , Dong Wang1 , Yanjiao Wang, “Security DV-hop localisation algorithm against
wormhole attack in wireless sensor network”, IET Wirel. Sens. Syst., 2018, Vol. 8 Issue 2, pp.
68-75, the Institution of Engineering and Technology 2018
[17]
RanuShukla, Rekha Jain, P. D. Vyavahare, “Combating against Wormhole Attack in Trust and
Energy Aware Secure Routing Protocol (TESRP) in Wireless Sensor Network”, Proceeding
International conference on Recent Innovations is Signal Processing and Embedded Systems
(RISE -2017) 27-29 October,2017
[18]
Bharat Bhushan, Dr. G. Sahoo, “Detection and Defense Mechanisms against Wormhole
Attacks in Wireless Sensor Networks”, IEEE, 2017
[19]
Swati Bhagat, TrishnaPanse, “A Detection and Prevention of Wormhole Attack in
Homogeneous Wireless Sensor Network”, IEEE, 2016
[20]
Mostefa BENDJIMA, Mohammed Feham, “Wormhole Attack Detection in Wireless Sensor
Networks”, SAI Computing Conference 2016 July 13-15, 2016
17
Appendices
Appendix A: Project Gantt chart
Appendix B: Interim presentation slides
Appendices - 1 -
Appendices - 2 -
Appendix A: Project Gantt chart
Sinkhole Attack in Wireless Sensor Network
Thesis 2022/23
1
Motivation of the Project
Introduction
Literature Review
Project Proposal
Resource Gathering
Sourcing Papers
Generate Gantt
70%
80%
70%
70%
100%
100%
100%
100%
11/16/2022 11/26/2022
10/27/2022 11/16/2022
11/17/2022 11/27/2022
11/6/2022 11/16/2022
10/7/2022 12/26/2022
10/4/2022 12/13/2022
10/4/2022 11/3/2022
10/6/2022 10/26/2022
10/5/2022 12/19/2023
Reference & Formatting
Results & Conclusions
Action Plan
Literature Review
Abstract
Network Simulation
Initial Testing
Inital Set Up
0%
0%
0%
10%
20%
70%
30%
0%
0%
20%
0%
10/9/2023 11/8/2023
10/3/2023 10/8/2023
9/28/2023 10/3/2023
9/21/2023 9/28/2023
9/6/2023 9/24/2023
1/26/2023 6/25/2023
3/7/2023 3/27/2023
1/26/2023 2/15/2023
1/2/2023 1/7/2023
12/22/2022 1/1/2023
12/2/2022 12/18/2022
12/12/2023 12/22/2023
Thesis Completion
Sep 12, 2022
Sep 19, 2022
Sep 26, 2022
Oct 3, 2022
Oct 10, 2022
Oct 24, 2022
Interim Report Deliverable
Oct 17, 2022
MTWT FSSMTWT FSSMTWT FSSMTWT FSSMTWT FSSMTWT FSSMTWT
Oct 31, 2022
Nov 7, 2022
Nov 14, 2022
Nov 21, 2022
Nov 28, 2022
Dec 5, 2022
Dec 12, 2022
Dec 19, 2022
Dec 26, 2022
Jan 2, 2023
Jan 9, 2023
Jan 16, 2023
Jan 23, 2023
Jan 30, 2023
Feb 6, 2023
Feb 20, 2023
Majority of Project design to be done
Feb 13, 2023
Feb 27, 2023
Mar 6, 2023
Mar 13, 2023
Final Report Due
Mar 27, 2023
Posters & Presentation Due
Mar 20, 2023
Apr 3, 2023
Apr 10, 2023
Apr 17, 2023
Apr 24, 2023
May 1, 2023
F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S SMTWT F S S
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 1 2 3 4 5 6 7 8 9 10 11 12 13 14 # 16 17 18 19 20 21 22 23 24 25 26 27 28 1 2 3 4 5 6 7 8 9 10 11 12 # 14 15 16 17 18 19 20 21 # 23 24 25 26 27 28 29 30 31 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 1 2 3 4 5 6 7
Sep 5, 2022
Thesis Start
Fri, 09/09/2022
Enter the name of the Project Lead in cell B3. EntDater the Project Start date in cell E3. Pooject Start: label is in cell C3.
START
Display Week
PROGRESS
9/9/2022 9/29/2022
END
100%
9/29/2022 10/4/2022
TASK
Project Outline
100%
Project Identification
Supervisor
Background Theory
50%
11/27/2022 1/26/2023
Project Planning & Resource Gathering
Action Plan
40%
Reading & Re-reading
0%
Initial Research
Experimental results
Instructor Review
11/8/2023 11/14/2023
Presenting Project
Final Review & Submit ion
0%
Project Development
Buffer Room
Appendices - 3 -
Appendices - 4 -
Appendix B: Interim presentation slides
Appendices - 5 -
Appendices - 6 -
Appendices - 7 -
Appendices - 8 -
Appendices - 9 -
Appendices - 10 -
Appendices - 11 -
Download