Your SlideShare is downloading. ×
Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

3,629
views

Published on

Published in: Technology

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,629
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
181
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Miss. Ketaki Deshmukh(Amrutvahini College of Engineering)
  • 2. • Introduction• Existing System• Proposed System• Architectural Diagram• Features• Application• Future Scope• Conclusion• References
  • 3. • A sensor node wirelessly sends messages to a base station via multi-hop path Fig: Wireless sensor network
  • 4. • Security of WSNs• Trust Aware Shell : A robust trust aware routing framework for dynamic WSNs provides trustworthy and energy-efficient route effective against harmful attacks
  • 5. • Hackers aggravate network conditions• A traditional techniques does not address the severe problems: tampering nodes create traffic collision drop or misdirect messages in routes jam the communication channel by creating radio interference
  • 6. • Protect WSNs from the harmful attacks exploiting the replay of routing information• Centres on trustworthiness and energy efficiency• Allow existing routing protocols to incorporate our implementation• No tight time synchronization & known geographic information
  • 7. Selective forwardingWormhole attackSinkhole attackSybil attack
  • 8. Sinkhole Attack Wormhole Attack
  • 9. Neighborhood Table Neighbor Energy CostFig. Working of Energy Watcher
  • 10. ENb = EN–>b + EbENb: Average Energy Cost.EN–>b:Average Energy Cost of successfully delivering a data packet from N to its neighbour b.Eb: Energy Cost for b.
  • 11. •Trust manager is to get neighbor trust level from aneighborhood table Fig: Example To Illustrate Working Of Trust Manager
  • 12. Source Destination Node node Malicious Node Destination Node Source node (a)Routing requestSource Malicious Nodenode Destination Node (c)Data conformation Response form the destination Response Node 2 Node 1 node (b)Routing response
  • 13. Fig: Trust manager level table
  • 14. High ThroughputEnergy efficientScalableAdaptable
  • 15. Low LatencyNo Balanced Network LoadDenial-Of-Service Attacks cannot be addressed
  • 16. Mobile Target Detection in the Presence of an Anti-Detection MechanismAuthenticated RoutingNode-to-Node Key AgreementSecure Military ApplicationHealthcare Application
  • 17. Conclusion
  • 18. • G. Zhan, W. Shi, and J. Deng, “Tarf: A trust-aware routing framework for wireless sensor networks,” in Proceeding of the 7th European Conference on Wireless Sensor Networks (EWSN’12), 2012.• F. Zhao and L. Guibas, Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann Publishers, 2004.• C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proceedings of the1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003.• M. Jain and H. Kandwal, “A survey on complex wormhole attack in wireless ad hoc networks,” in Proceedings of International Con- ference on Advances in Computing, Control, and Telecommunication Technologies (ACT ’09), 28-29 2009

×