Topology Control In Mobile Ad Hoc networks With Cooperative

advertisement
ABSTRACT
In wireless sensor networks, the adversary may inject false reports to exhaust network
energy or trigger false alarms with compromised sensor nodes. In response to the problems of
existing schemes on the security resiliency, applicability and filtering effectiveness, this Project
proposes a scheme, referred to as Grouping-enhanced Resilient Probabilistic En-route Filtering
(GRPEF). In GRPEF, an efficient distributed algorithm is proposed to group nodes without
incurring extra groups, and a multiaxis division based approach for deriving location-aware keys
is used to overcome the threshold problem and remove the dependence on the sink immobility
and routing protocols. Compared to the existing schemes, GRPEF significantly improves the
effectiveness of the en-route filtering and can be applied to the sensor networks with mobile
sinks while reserving the resiliency.
Existing System
These schemes adopt a general en-route filtering framework to protect data authenticity,
detect and filter out false reports. This framework assumes that an event can be detected by more
than T sensors. To protect the report authenticity, a legitimate report is collaboratively endorsed
with T (T > 1) distinct Message Authentication Codes (MACs) from the nodes detecting the
event simultaneously. To filter the false reports, the nodes in the routing path share the
authentication keys for the report endorsement. As a result, an invalid report that has less than T
MACs or any incorrect MAC can be detected and dropped by the forwarding nodes or the sinks.
There are two ways to share the authentication keys for the report endorsement, that are, routingspecific way and probabilistic way.
In the routing-specific key sharing schemes such as IHA, DEFS, and LEDS, the
authentication keys of sensor nodes are shared with the forwarding nodes in the routing path by
pairwise key establishment or key dissemination. Since the probabilistic key sharing schemes do
not need periodic node association and key dissemination, they are superior to the routingspecific key sharing schemes and are preferred by the resource-constrained WSNs. However, the
existing probabilistic schemes have their shortages.
Contact: 040-23344332, 8008491861
Email id: info@projectgenie.in , www.projectgenie.in
Introduction
In many monitoring applications, wireless sensor networks (WSNs) are usually deployed
in a hostile environment, and an adversary can easily capture and compromise sensor nodes due
to their low cost and unattended nature. Once a node is compromised, the adversary can easily
launch false data injection attack by the compromised nodes for forging bogus event reports to
the base station. This attack may not only trigger false alarms but also drain out the limited
resources of the forwarding nodes in the routing paths. Thus, it is critical for WSNs to defend
such attack from two aspects of protecting report authenticity and filtering bogus reports. These
schemes adopt a general en-route filtering framework to protect data authenticity, detect and
filter out false reports. There are two ways to share the authentication keys for the report
endorsement, that are, routing-specific way and probabilistic way. In the routing-specific key
sharing schemes such as IHA , DEFS , and LEDS , the authentication keys of sensor nodes are
shared with the forwarding nodes in the routing path by pairwise key establishment or key
dissemination . IHA and DEFS require periodic maintenance of node association or key
dissemination along the routing paths to the sink, which incur great energy cost because of
frequent routing changes in WSNs. In the probabilistic key sharing schemes such as SEF and
LBRS , the sensor nodes are divided into n(n > T) groups according to the key distribution
before deployment. The nodes in the same group share common authentication keys with a
probability. A legitimate report is endorsed with T MACs each of which is generated by a
detecting node from different group, which is referred to as T-group authentication. Since the
probabilistic key sharing schemes do not need periodic node association and key dissemination,
they are superior to the routing-specific key sharing schemes and are preferred by the resourceconstrained WSNs.
Contact: 040-23344332, 8008491861
Email id: info@projectgenie.in , www.projectgenie.in
Proposed System
In the probabilistic key sharing schemes such as SEF and LBRS , the sensor nodes are
divided into n(n > T) groups according to the key distribution before deployment. The nodes in
the same group share common authentication keys with a probability. A legitimate report is
endorsed with T MACs each of which is generated by a detecting node from different group,
which is referred to as T-group authentication. The extra n _ T groups are introduced to enable
T-group authentication to work for events in as large area as possible. A random key
predistribution approach is adopted in SEF . A global key pool is evenly divided into n partitions.
Each node randomly picks k keys from one partition and the nodes holding keys from the same
partition form a group. In LBRS, each node is preloaded with one of n master secrets, and the
nodes having the same master secret form a group. The authentication keys are derived based on
the locations of cells in the terrain. All the nodes in the routing paths to the sink shares the
authentication keys with a probability.
Comparing with SEF and LBRS, GRPEF has the following advantages.
1. In GRPEF, an efficient distributed algorithm is proposed to divide sensor nodes into
exact T groups. It can guarantee that any location in the monitored area is covered
simultaneously by T nodes from distinct groups with a high probability. The removal of the extra
groups significantly improves the enrooting filtering effectiveness, as shown by our formal
analysis. GRPEF achieves the same coverage percentage of T-group authentication as SEF and
LBRS without requiring more than T groups.
2. To tackle the threshold limitation of SEF, a novel location-aware key derivation technique
based on multiaxis division is proposed without assuming the sink immobility and specific
routing models. As a result, GRPEF achieves the resiliency against node compromise while
being applicable to the networks with mobile sinks and various routing protocols. Our theoretical
analysis shows that GRPEF achieves much higher resiliency than SEF.
Contact: 040-23344332, 8008491861
Email id: info@projectgenie.in , www.projectgenie.in
Module List
 Login
 Sensor node
 Mobile Sink
 Monitoring and Reporting Phase
 False Data Injection
 En-Route Filtering
Module Description
Login
In this module the user can get in to the system by enter the username and password. The user
can register them self in the particular Sensor Node. Therefore we can easily identify a Mobile
Sink, where it is resident.
Sensor Node
In this module, the sensor node requests the mobile sink and then mobile sink response to the
sensor node. Mobile sink provides the Message Authentication Code (MAC) to the sensor node
.Each sensor node use this MAC and then actual data is send to the sensor node-2.Sensor node-2
may inject the false data .Finally send to the mobile sink.
Mobile sink:
The mobile sink receives the data from the all nodes in network which may be false data or
integrity data. After receiving data, it will identify the false inject data by enroute-filtering.
Monitoring and Reporting Phase:
When an event occurs in partition. All detecting nodes are organized into a cluster and
collaboratively generate the event report E with the event location. The message authentication
code of report E generated with a symmetric key. The detecting node in group computes MAC
where k is the endorsement key bound with the partition. Then the detecting node sends a tuple
Contact: 040-23344332, 8008491861
Email id: info@projectgenie.in , www.projectgenie.in
to the cluster head CH. When CH collects MAC from distinct groups, it sends
out the report with the endorsement to the sink.
False Data Injection
In this module focus on the false data injection attack, in which the compromised nodes inject
forged event reports to trigger false alarms or to deplete the limited resources of nodes in the
routing paths. Our problem is to design a scheme that can detect and filter false reports such that
false reports is detected and dropped as early as possible, the threshold limitation of the solutions
is overcome, graceful performance degradation is achieved when more and more nodes are
compromised, and the scheme should be independent of routing protocols and applicable to the
WSNs with mobile sinks.
En-route filtering
 Every forwarding node verifies the MAC computed by its lower association node, and
then removes that MAC from the received report.
 If the verification succeeds, it then computes and attaches a new MAC based on its
pairwise key shared with its upper associated node.
 Finally, it forwards the report to the next node towards the BS.
Contact: 040-23344332, 8008491861
Email id: info@projectgenie.in , www.projectgenie.in
System Requirement Specification:
Software Requirements:
Front End/GUI Tool
: Microsoft Visual studio 2008
Operating System
: Windows family
Language
: C#.NET
Technology
: ASP.NET 3.5
Hardware Requirements:
Processor
: Pentium dual core
RAM
: 1 GB
Hard Disk Drive
: 80 GB
Monitor
: 17” Color Monitor
Contact: 040-23344332, 8008491861
Email id: info@projectgenie.in , www.projectgenie.in
Download