Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)


 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Malicious Node Detection inWireless Sensor Networks
Post: #1

Abstract
This work provides a solution to identify malicious nodesin wireless sensor networks through detection of maliciousmessage transmissions in a network. A message transmissionis considered suspicious if its signal strength is incompatiblewith its originator’s geographical position. We provideprotocols for detecting suspicious transmissions – andthe consequent identification of malicious nodes – and fordisseminating this information in the network. We evaluatethe detection rate and the efficiency of our solution along anumber of parameters.
1. Introduction
A wireless sensor network (WSN) consists of a set ofcompact and automated devices called sensing nodes. Asensing node is a computational device that has memory,battery, processor, transceiver, and a sensing device. TheBerkeley MICA Mote [4, 1], SmartDust [7, 8, 12], andCotsDust [5] are examples of such nodes. These nodes aredistributed across an area and communicate among themselves,forming an ad hoc network. Sensor networks containspecial nodes that process and store the information collectedby the network; they are called sink nodes. Communicationbetween two nodes is performed in multiple hopsif they are not within each other’s transmission range.Wireless sensor networks can collect data from the environmentwhere they are embedded. The data are often firstprocessed by the sensor nodes and then sent over non-securechannels to the sink node for further processing. Some ofthe applications envisioned for sensor networks are environmentalmonitoring, infrastructure management, publicsafety, medical, home and office security, transportation,and battlefield surveillance. Given their criticality, these applicationsare likely to be attacked.There are a number of ways one can attack a WSN. Forexample, one can spoof the various fields of a messagewhile it is in transit, in such a way that what the recipientreceives is an altered copy of the original message. Onecan also tamper with a node (its hardware and/or software),so as to alter its behavior. Different types of attacks willrequire different types of countermeasures.In this work, we focus on two types of attacks: HELLOflood attacks [9] and wormhole attacks [6]. HELLO messagesare used in many protocols by nodes that want toannounce their presence and proximity to their neighbors.Most of these protocols rely on the assumption that a nodeA is within the radio transmission range of another node Bif A is able to receive messages from B. In a HELLO floodattack, a malicious node may try to transmit a message withan abnormally high power so as to make all nodes believethat it is their neighbor.Wormhole attacks can be described in the followingsteps. An adversary A tunnels a message received to a secondadversary B in a distant part of the network using a lowlatencyout-of-band channel. B then retransmits the messageexactly as received to the nodes in its neighborhood.An immediate result of a wormhole attack is that nodes thathear the transmission from B are tricked into thinking thatthey are neighbors of whichever node originated the message(this node is most likely located in a distant part of thenetwork).Both the HELLO flood attack and the wormhole attackare typically carried out to compromise route establishmentin a network. For example, a malicious node that broadcastsa routing beacon with an extra high power could lead a largenumber of nodes to attempt to use it as their next hop in theirroute to the sink. But those sufficiently far away would besimply sending their messages into the oblivion. A similarscenario results from a wormhole attack. A malicious nodecould convince nodes that are normally multiple hops fromthe sink node that they are just one hop away.


Download full report
http://doi.ieeecomputersociety10.1109/IP...04.1302934
Post: #2
i want malicious node detection in wireless networks


Attached File(s)
.pdf  277_Plant.pdf (Size: 218.74 KB / Downloads: 3)
Post: #3

A strategy based on past / present values ​​provided by each sensor in a network to detect its malicious activity. Basically, we are going to compare at each moment the sensor output with its estimated value calculated by an auto regressive predictor. In case the difference between the two values ​​is greater than a chosen threshold, the sensor node becomes suspicious and a decision block is activated. Wireless sensor networks (WSN) are one of the most important and promising domains of the 21st century. The recent growth of the technology (greater computational power, small chips and microprocessors with less energy consumption) opened a new world for the investigation in this field. A sensor network is a collection of small distributed devices called motes, using sensors to measure (temperature, movement, pressure, sound) and for prediction (weather forecast, fire ignition, earthquakes, military attack, building safety). Some of the most important features of wireless sensor networks are environmentally free ownership and their ability to self-organize throughout the life cycle. When deployed in any type of environment, the motes are subject to attacks and without high security the information that passes through the network could be listened to and also altered. With this, the network of wireless sensors could be damaged and prove useless for certain purposes. Safe protocols are still under investigation, none were successful enough to be standardized. Although protocol security is a very important issue in the development of wireless sensor networks, the detection of anomalies and intruders is also a significant problem. After intrusion detection, the sensor network can make decisions to investigate, search, delete, or rewrite malicious nodes if possible. If intrusion detection is not performed at the appropriate time, the captured node code could be read and rewritten for malicious purposes.

Please Use Search http://projects-seminars.net/search.php wisely To Get More Information About A Seminar Or Project Topic
 


[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.
Marked Categories : what is malicious node in wsn, malicious node detection in wsn, how to find malicious node, malicious node detection sensor networks pdf, abnormal sensor faults node detection filtering, malicious node, examples of malicious node, malicious node detection, how to find malicious nodes ppt, what is malisious node, finding malicious node on network, project to find number nodes in electrical network, malicious node detection sensor networks pdf 2012, solutions to node detection doc, what is malicious node, malicious node detection in wireless sensor abstract free download, malicious node project, malicious node detection in wireless sensor networks ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  ir sensor interfacing with lpc2148 Guest 1 0 27-03-2017 09:49 AM
Last Post: jaseela123
  patient fall detection using hip and abdomen sensors Guest 1 0 24-03-2017 09:36 AM
Last Post: jaseela123
  concealed weapon detection using digital image processing ppt Guest 1 0 23-03-2017 10:08 AM
Last Post: jaseela123
  universal current sensor full ppt file Guest 3 3,046 22-03-2017 03:56 PM
Last Post: jaseela123
  automatic sensor bridge ppt Guest 1 0 21-03-2017 12:32 PM
Last Post: jaseela123
  automatic sensor bridge ppt Guest 1 0 21-03-2017 12:31 PM
Last Post: jaseela123
  microwave life detection system free ppt Guest 1 0 21-03-2017 12:03 PM
Last Post: jaseela123
Thumbs Down image forgery detection using DCT Guest 2 0 15-03-2017 09:18 AM
Last Post: jaseela123
Question ppt for heat sensor with fan cooling Guest 1 0 07-03-2017 11:09 AM
Last Post: jaseela123
  ieee paper of based on universal current sensor aravind0318 1 0 07-03-2017 11:05 AM
Last Post: jaseela123
This Page May Contain What is Malicious Node Detection inWireless Sensor Networks And Latest Information/News About Malicious Node Detection inWireless Sensor Networks,If Not ...Use Search to get more info about Malicious Node Detection inWireless Sensor Networks Or Ask Here

Options: