Wireless sensor networks

1,943
-1

Published on

use it

Published in: Education, Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,943
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
106
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Wireless sensor networks

  1. 1. WIRELESS SENSOR NETWORKS
  2. 2. Introduction• In this paper, we focus on defending against the wormhole attack in the DV-Hop localization process, i.e., overcoming the impacts of the wormhole attack on the DV- Hop localization.• We propose a label-based secure localization scheme which is wormhole attack resistant based on the DV-Hop localization process.
  3. 3. OBJECTIVE OF LABEL BASED SECURE LOCALIZATION• We analyze the impact of the wormhole attack on the DV-Hop localization process.• We propose a wormhole attack resistant approach that can remove the packets delivered through the wormhole link to achieve secure localization.
  4. 4. Literature ReviewExisting System• Wormhole attack detection algorithm using a hop counting technique as a probe procedure, reconstructing a local map for each node and using a “diameter” feature to detect abnormalities caused by wormholes. continued…
  5. 5. Literature Review• The wormhole attack detection scheme adopts the maximum number of independent neighbors of two non-neighbor nodes.• Existing Wormhole attacks can negatively affect the localization in wireless sensor networks.
  6. 6. Proposed System• We describe our proposed wormhole attack resistant localization scheme, called label- based DV Hop localization.• The label-based DV-Hop localization scheme includes three phases, beacon nodes labeling, sensor nodes labeling, and DV-Hop-based secure localization.
  7. 7. Proposed System(continued)• The beacon nodes are differentiated and labeled according to their geographic relationship under a wormhole attack.• After eliminating the illegal connections among the labeled neighboring nodes which are contaminated by the wormhole attack, the DV Hop localization procedure can be successfully conducted.
  8. 8. System RequirmentsHARDWARE REQUIREMENTS:Processor : Pentium IV 2.8GHz.RAM : 512 MB RAM.Hard Disk : 40 GB.Input device : Keyboard and Mouse.Output device : VGA and High Resolution Monitor.
  9. 9. System RequirmentsSOFTWARE REQUIREMENTS:Operating System : Windows XPLanguage : JDK 1.5.
  10. 10. SYSTEM DESIGNDATAFLOW DIAGRAM
  11. 11. USE CASE DIAGRAM
  12. 12. STATE DIAGRAM
  13. 13. SEQUENCE DIAGRAM
  14. 14. DV-HOP LOCALIZATIONThe main idea of our scheme is to generate a pseudoneighbor list for each beacon node, use all pseudoneighbor lists received from neighboring beaconnodes to classify all attacked nodes into differentgroups, and then label all neighboring nodes(including beacons and sensors). According to thelabels of neighboring nodes, each node prohibits thecommunications with its pseudo neighbors, whichare attacked by the wormhole attack.
  15. 15. WORMHOLE ATTACKWe address the Security issue of thewormhole attack upon the range-free DV-Hopbased localization process. We analyze theimpacts of wormhole attack on DV-Hoplocalization scheme. Based on the basic DV-Hop localization process, we propose a label-based secure localization scheme to defendagainst the wormhole attack.
  16. 16. BASIC DV-HOP LOCALIZATION“Basic DV-Hop Localization without WormholeAttack” indicates the relative localization error forthe DV-Hop localization scheme when there is nowormhole attack. We can see that the curve is quitestable when the ratio of beacons to sensors varies,which suggests that the accuracy of the DV-hoplocalization is insensitive to the number of beaconsin the network. Therefore, this curve is used as thereference when the wormhole attack exists.
  17. 17. LABEL-BASED DV-HOP LOCALIZATIONWe propose a label-based secure localizationscheme to defend against the wormholeattack. Simulation results demonstrate thatour proposed secure localization scheme iscapable of detecting the wormhole attack andresisting its adverse impacts with a highprobability.
  18. 18. ConclusionWe analyze the severe impacts of thewormhole attack on the DV-Hop basedlocalization in wirelesssensor networks. Totackle this secure problem, wepropose a label-based secure localization scheme to detectand resist the wormhole attack for the DV-Hop localization process. We also conductsimulations to demonstrate the effectivenessof our proposed scheme under differentnetwork parameters.
  19. 19. FUTURE ENHANCEMENTThe proposed scheme works well in thescenario when the network has no packetloss, and the transmission ranges of all nodesare identical. In our future work, we willextend our secure localization scheme totolerate the packet loss. Also, we will considerthe scenario when different types of nodeshave different transmission ranges.
  20. 20. REFERENCES• H. Chen, W. Lou, and Z. Wang, “A Consistency-based Secure Localization Scheme AgainstWormhole Attacks in WSNs,”in Proc. of the International Conference on Wireless Algorithms, Systems and Applications (WASA), 2009.• H. Chen, W. Lou, X. Sun, and Z. Wang, “A Secure Localization Approach Against Wormhole Attacks Using Distance Consistency,” Eurasip Journal on Wireless Communications and Networking, Spacial Issue on Wireless Network Algorithms, Systems, and Applications, 2009.
  21. 21. REFERENCES(continued)W. Wang and A. Lu, “Interactive wormhole detection andevaluation,”Information Visualization, vol. 6, no. 1, pp. 3–17,2007. ——, “HiRLoc: High-Resolution Robust Localization forWireless Sensor Networks,” IEEE Journal on Selected Areas inCommunications, vol. 24, no. 2, pp. 233–246, 2006. S. Capkun, M. Cagalj, and M. Srivastava, “Secure LocalizationWith Hidden and Mobile Base Stations,” in Proc. of IEEEINFOCOM, 2006.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×