SlideShare a Scribd company logo
1 of 6
Download to read offline
Abhinaya.E.V / International Journal of Engineering Research and Applications
                    (IJERA)             ISSN: 2248-9622       www.ijera.com
                         Vol. 3, Issue 2, March -April 2013, pp.410-415
  Compromised Node Detection and Revocation in Zone Framed
           Networks for Wireless Sensor Networks
                                              Abhinaya.E.V¹
                                          Post Graduate Student
         Department of Electronics and Communication K.Ramakrishnan College Of Engineering,India


ABSTRACT
         Sensor nodes are usually deployed in an         communication and computation capabilities; large
open environment therefore they are subjected to         number of them may collectively monitor the
various kinds of attacks like Worm Hole attack,          physical world, disseminate information upon
Black Hole attack, False Data Injection attacks.         critical environmental events and process the
Since the attackers can cause disruption and             information on the fly.
failure to the network, it’s very important to
detect these compromised nodes and revoke them                    The issues of network lifetime and data
before any major disruption occurs. Therefore,           availability are extremely important in WSN due to
it’s very important to safe guard the network            their deployment in hostile environment. The system
from further disruption. For this purpose a              should provide fault tolerant energy efficient real-
method called Biased SPRT (Sequential                    time communication as well as automatic and
Probability Ratio Test) is used by setting up some       effective action in crisis situations. A typical sensor
Threshold Value and Trust Aggregator in the              network operates in five phases which are planning
network scenario for which the network is                phase, deployment phase, post-deployment phase,
divided into number of Zones.                            operation phase and post-operation phase.

Key terms – Compromised Node, SPRT, B-SPRT,              a. In planning phase, a site survey is conducted to
Trust Aggregator, Zones, False Positives, False             evaluate deployment environment and its
Negatives.                                                  conditions to select a suitable deployment
                                                            mechanism.
I.INTRODUCTION                                           b. In deployment phase, sensors are randomly
          Wireless Sensor Networks (WSNs)                   deployed over a target region.
have      emerged      as a research areas with an       c. In post-deployment phase, the sensor networks
overwhelming effect on practical application                operators need to identify or estimate the
developments. They permit fine grain observation of         location of sensors to access coverage.
the ambient environment at an economical cost            d. The operation phase involves the normal
much lower than currently possible. In hostile              operation of monitoring tasks where sensors
environments where human participation may be too           observe the environment and generate data.
dangerous sensor networks may provide a robust           e. The post-oeration phase involves shutting down
service. Sensor networks are designed to transmit           and preserving the sensors for future operations
data from an array of sensor nodes to a data                or destroying the sensor network.
repository on a server. The advances in the
integration of micro-electro-mechanical system                     The sensor nodes consist of sensing, data
(MEMS),         microprocessor       and      wireless   processing and communicating components. They
communication technology have enabled the                can be used for continuous sensing, event detection
deployment of large-scale wireless sensor                as well as identification, location sensing and
networks[1]. WSN has potential to design many            control of actuators. The nodes are deployed either
new applications for handling emergency, military        inside the phenomenon or very close to it and can
and disaster relief operations that requires real time   operate unattended. They can use their processing
information for efficient coordination and               abilities to locally carry out simple computations
planning.sensors are devices that produce a              and transmit only required and partially processed
measurable response to a change in a physical            data. They may be organized into clusters or
condition like temperature, humidity, pressure etc.      collaborate together to complete a task that is issued
WSNs may consist of many different types of              by the users. In addition, positions of these nodes do
sensors such as seismic, magnetic, thermal, visual,      not need to be predefined[1][2]. These allow their
infrared, acoustic and radar, capable to monitor a       random deployment in inaccessible terrains or
wide variety of ambient conditions. Though each          disaster relief operations. The WSN provides an
individual sensor may have severe resource               intelligent platform to gather and analyze data
constraint in terms of energy, memory,                   without human intervention. As a result, WSN’s


                                                                                                410 | P a g e
Abhinaya.E.V / International Journal of Engineering Research and Applications
                     (IJERA)             ISSN: 2248-9622       www.ijera.com
                          Vol. 3, Issue 2, March -April 2013, pp.410-415
have a wide range of applications such as military        scheme facilitates node compromise detection and
applications, to detect and track hostile objects in a    revocation by leveraging zone trust information. In
battle field or in environmental research                 the first scenario specifically, we divide the whole
applications, to monitor a disaster as seismic tremor,    network into a number of zones randomly like
a tornado or a flood or for industrial applications, to   Z1,Z2,Z3,.....For each zone a Trust Aggregator(TA)
guide and diagnose robots or machines in a factory        is assigned for a particular time slot. The Trust
or for educational applications, to monitor               Aggregator is responsible for collecting the log
developmental childhood or to create a problem            information’s from all the nodes available in that
solving environment.                                      particular zone for that particular time slot. Once it
                                                          fetches all the informations’s then the Trust
          Main idea of this paper is to detect the        Aggregator sends the report to Base Station(BS).
compromised nodes using Sequential Hypothesis             This way all the Trust Aggregator of different zones
Testing (SPRT). Two scenarios are checked here. In        sends their report to Base Station. At Base Station,
first scenario, the whole network is divided              all reports from different zones are checked. Each
randomly into some number of zones where                  reports contains some particular Trust Value(TV)
software attestation is performed over the affected       which is checked in accordance to a Threshold
zone with maximum number of untrustworthy nodes           Value(TV) set prior at Base Station. Once the Trust
which consumes more energy and provides more              value is below the given Threshold Value, the
delay whereas in second scenario the whole scenario       corresponding node can participate in further
is divided into low trust samples and high trust          transmissions and receptions. But, if the Trust Value
samples where only high trust samples are used in         of particular node is higher than the given Threshold
transmission and reception. This is performed using       Value, that particular node is said to be
Biased SPRT. Since only high trust samples are            Compromised Node(CN) or Malicious Node(MN)
used the problem of compromising is restricted.           or Untrustworthy Node(UN). This particular node is
Hence it provides better results than the previous        considered as affected. The Zone with maximum
scenario.                                                 compromised nodes are said to be affected zone.
                                                          The affected nodes in that particular zone can be
II. MODEL                                                 restored by performing Software Attestation
         A two-dimensional static sensor network is       schemes. This Software Attestation Scheme checks
assumed in which sensor nodes do not change their         for the subverted module and programs and restores
locations after deployment since they are immobile.       them using SPRT. In this case, large delay is noticed
Their locations can be obtained by using some             as each node’s log information has to be collected
Secure Localization Schemes. We also assume that          every time. Also, overhead and energy consumption
the link between all sensors is bidirectional as they     is high.
can perform both transmission and reception. Let’s
assume an Adversary attacks a set of nodes in each                In second scenario the whole network is
Zone. However, we limit on his attack capability          considered into two set of samples: low trust
such that he does not compromise a majority of the        samples and high trust samples where only high
nodes in each region. This is reasonable, since           samples are considered to take part in the network
compromising a majority of sensor nodes in a region       transmission using Biased SPRT. Therefore, less
is far from optimal. This is mainly because his           delay and less energy is consumed compared to
influence is limited to the region while he spends        previous scenario.
substantial time and effort to compromise many
nodes. The same time and effort could instead be          IV. PROTOCOL DESCRIPTION
used to spread out compromised nodes over a wider
area and cause greater disruption to the network.         A. Network Formation
                                                                    A network is divided into a set of zones
III. DECTECTION AND REVOCATION                            with Trust Values and untrustworthy zone is
OF COMPROMISED NODES                                      detected in accordance with the zone Trust Values.
         Reputation-based       trust    management       Once a zone is found to be affected or untrustworthy
schemes do not stop compromised nodes from doing          then software attestation is performed by the
malicious activities in the network[2][3][4][5]. Also,    network operator over all the sensor nodes present
existing schemes based on software attestation            in that particular zone. Since, the software
require each sensor to be periodically attested           attestation is performed over all the nodes including
because it cannot be predicted when attacker              the Honest nodes/Trustworthy nodes along with
compromises sensors. The periodic attestation of          compromised nodes, only in untrustworthy nodes it
individual nodes will incur large overhead in terms       incurs less overhead. In our scheme, specifically
of computation and communication[2]. To mitigate          SPRT method is used as this method depends on
these limitations, we propose a zone-framed node          multiple evidences rather than single evidence.
compromise detection and revocation scheme. Our           Also, its known fact that multiple evidences

                                                                                                411 | P a g e
Abhinaya.E.V / International Journal of Engineering Research and Applications
                    (IJERA)             ISSN: 2248-9622       www.ijera.com
                         Vol. 3, Issue 2, March -April 2013, pp.410-415
produces accurate result when compared to single        B. Trust Aggregator Setup and Trust
evidence. Therefore this statistical method is chosen        Evaluation
which contains two limits namely null hypothesis                 The network considered here is static
and alternate hypothesis. These two limits play         network which contains sensor node s with fixed
major role in determining the correct results. When     location. The sensor node s discovers the ID’s of
the Trust Value is less than the given Threshold        its neighbouring nodes and establishes pairwise
Value, it is considered to be null hypothesis and it    secret keys with them. The Trust Aggregator is
can be included in the upcoming process whereas         selected(TA) in round robin manner using
when the Trust Value is greater than the Threshold      pseudorandom number. Each node acts TA in its
Value, it is considered as affected requiring           given duty time slot and the starting time of each
revocation. The main advantage of using SPRT is         node is same providing same permutations. For
that correct decision can be reached at very shorter    each time slot Ti, one node act as Trust Aggregator
time providing low false positives and false            by collecting the log information of all
negatives.                                              neighbouring nodes and also includes its own log
                                                        information which are together called as Trust
         The network operator assigns each node         Reports. The more information is shared between
with unique ID and preloads each and every sensor       the nodes, the more will be the trust level.
node with shared secret keys to communicate with        Neighbouring nodes are represented using s .
Base Station and pair-wise keys to communicate
between themselves[6][11]. Zone area plays an           TABLE 1
important role in estimating the cost of the system.    COMMON PARAMETERS ADOPTED IN THE
For example, if the zone size is small it would not     SIMULATION
be possible to place all the nodes within the zone        Parameters             Values
without causing some disruptions. And if the zone is
huge, the intra-communication between the nodes                                                    1000*1000
require multiple hops which increases the cost of the      Simulation area                         m
system[12][13]. Therefore, zone is taken in the form
of square whose perimeter is P such that the               Number of nodes                         100
diagonal is √2P equal to the communication range
and the optimal zone size is √2P/2.                        Transmission range                      250m
                 Network Formation
                                                           Simulation duration                     150ms
                  Zone Segmentation                        Mobility model                          Random
                                                                                                   waypoint
                   Trust Calculation
                                                           Propagation                             Two way
                                                                                                   ground
                 Performance Analysis


Fig. 1 Basic block diagram of 1st scenario using         C. Detection and Revocation
SPRT                                                              Each TA sends its trust reports to the Base-
                                                        Station along with fresh time stamp. Hence, here
         The network operator assigns each node         replay attacks can be avoided[7]. As already the BS
with unique ID and preloads each and every sensor       is maintaining the list TA’s neighbouring lists, it
node with shared secret keys to communicate with        would be easier for the BS to detect most affected
Base Station and pair-wise keys to communicate          zone with maximum number of affected sensor
between themselves[6][11]. Zone area plays an           nodes. For this purpose basic simple SPRT is used
important role in estimating the cost of the system.    which contains both null hypothesis and alternate
For example, if the zone size is small it would not     hypothesis[8]. When the Trust Value is less than
be possible to place all the nodes within the zone      Preset Threshold Value, it is considered as null
without causing some disruptions. And if the zone is    hypothesis and these nodes are eligible to participate
huge, the intra-communication between the nodes         in further transmissions where as the nodes with
require multiple hops which increases the cost of the   alternate hypothesis are corrected using some
system[12][13]. Therefore, zone is taken in the form    available software attestation schemes. The whole
of square whose perimeter is P such that the            network is divided into two sets of samples low trust
diagonal is √2P equal to the communication range        samples and high trust samples. The sensor nodes
and the optimal zone size is √2P/2.                     with low trust values are not allowed to participate
                                                        in the transmission and reception process in Biased-


                                                                                              412 | P a g e
Abhinaya.E.V / International Journal of Engineering Research and Applications
                    (IJERA)             ISSN: 2248-9622       www.ijera.com
                         Vol. 3, Issue 2, March -April 2013, pp.410-415
SPRT. Instead only high trust values are used          transmitting and receiving. The main three metrics
exclusively. Since only high trust samples are taken   used to evaluate the performance are Number of
into consideration the probability of false positive   reports, False positives, False negatives. Number of
and false negative is lesser compared to the first     reports is the zone trust reports sent by TA to the
scenario of simple SPRT. Also delay, throughput        BS. False positive is the error probability that a
results are better than the first scenario.            trustworthy zone is impersonated as untrustworthy
                                                       zone. False negative is the error probability that a
                                                       untrustworthy zone is misidentified as trustworthy.
                   Network Formation                   Performance parameters like delay, throughput,
                                                       energy consumption etc simulated using Network
                                                       Simulator2(NS2) of version 2.26. The simulated
              Network divided into zones               graphs clearly shows that delay is lesser and
              Each TA sends its trust                  throughput is also better in Biased-SPRT.
              reports to the Base-Station
           Assigning ID and Trust Values
              along with fresh time
      Assigning Pseudorandomhere replayeach node
              stamp. Hence, number for
              attacks can be avoided[7].
       One node is selected as Trust Aggregator(TA)
              As already the BS is
              maintaining the list TA’s
       TA sends Trust Value Reports to Base Station
              neighbouring          lists,   it
              would be easier for the BS
             Trust detectAnalysis using SPRT
              to value most affected
              zone       with       maximum
              No
              number of affected sensor
                                                                            Fig. 3 False Positive
              nodes. IfFor this purpose
                          Trust Value
              basic simple SPRT is used
                            >Trust
                         Threshold
              which contains both null
                                             Yes
              hypothesis and alternate
              hypothesis[8]. When the        sss
         Software of all the nodes less than zone
              Trust Value is in affected
                          is attested
              Preset Threshold Value, it
              is considered as null
                          Recovery
              hypothesis and these nodes
              are eligible to participate
              in further transmissions
              where as the nodes with
              alternate hypothesis are                 Fig. 4 False Negative
              corrected using some
              available               software
              attestation schemes.

                       The          whole
               network is divided into
               two sets of samples low
               trust samples and high
               trust samples. The sensor
               nodes with low trust
Fig. 2 Flow diagram ofare not scenario using SPRT
               values the 1st allowed to
               participate      in     the             Fig. 5 Simulation time Vs Received Packet
               transmission and reception
V.SIMULATION RESULTS
         The network in Biased-SPRT.
               process environment contains 100
nodes for simulation within high trust area of
               Instead only a network
1000*1000m.The simulation time usedsimulation
               values       are       or
duration is 150ms and the propagationonly chosen
               exclusively. Since model
is a Two way ground model capable of both
               high trust samples are
               taken into consideration
               the probability of false                                                     413 | P a g e
               positive and false negative
               is lesser compared to the
               first scenario of simple
Abhinaya.E.V / International Journal of Engineering Research and Applications
                      (IJERA)             ISSN: 2248-9622       www.ijera.com
                           Vol. 3, Issue 2, March -April 2013, pp.410-415
                                                    at a correct decision than the simple SPRT
                                                    used in first scenario. The performance of
                                                    Biased-SPRT is comparatively better than
                                                    the result of first scenario. First scenario
                                                    with Sequential Hypothesis Testing(SPRT)
                                                    gives 78.6% of correct performance and
                                                    second scenario with Biased-SPRT
                                                    provides 83.4%. Future enhancement
                                                    method will be Policy Enforcing Protocol
                                                    first, policy implementation in the multi-
                                                    tier networks is entirely distributed without
                                                    relying on any central trusted choke points.
                                                    Second, the trusted networks are self-
                                                    organized. They can be established and
                                                    managed spontaneously without requiring
                                                    pre-deployed trusted entities or centralized
                                                    management. Third, the multi-level trust
Fig.6 Simulation time Vs Throughput                 enables flexible enforcement of complex
                                                    policies, which can be defined across
                                                    various interdependent protocols and
                                                    enforced independently.

                                                    ACKNOWLEDGEMENT
                                                             The authors would like to thank
                                                    Dr.A.Varadarajan, Deputy Director of IGNOU,
                                                    Chennai for his full cooperation for providing us
                                                    with good faculties and thanks to all anonymous
                                                    reviewers for their valuable suggestions and
                                                    comments.

                                                    REFERENCES
                                                      [1]    S.Capkun and J.P. Hubaux. Secure
                                                             positioning in wireless networks. IEEE
                                                             Journal     on      Selected    Areas     in
Fig. 7 Pause time Vs Total remaining energy                  Communications, 24(2):221–232, February
                                                             2006.
                                                      [2]    S.Ganeriwal       and     M.     Srivastava.
                                                             Reputation-based framework for high
                                                             integrity sensor networks. In ACM SASN,
                                                             October 2004.
                                                      [3]    J. Ho, M. Wright, and S.K. Das. Fast
                                                             Detection of Replica Node Attacks in
                                                             Sensor Networks Using Sequential
                                                             Analysis. In IEEE INFOCOM,April 2009.
                                                      [4]    X. Hu, T. Park, and K. G. Shin. Attack-
                                                             tolerant time-synchronization in wireless
                                                             sensor networks. In IEEE INFOCOM,
                                                             April 2008.
                                                      [5]    J. Jung, V. Paxon, A.W. Berger, and H.
                                                             Balakrishnan. Fast port scan detection
                                                             using sequential hypothesis testing. In
Fig.8 Average number of reports and                          IEEE S&P, May 2004.
Error rates (fc-fraction of compromised               [6]    Z. Li, W. Trappe, Y. Zhang, and B. Nath.
nodes)                                                       Robust statistical methods for securing
                                                             wireless localization in sensor networks. In
VI.CONCLUSION AND FUTURE                                     IEEE IPSN, April2005.
ENHANCEMENT                                            [7]   B. Parno, A. Perrig, and V.D. Gligor.
         We infer that the Biased-SPRT                       Distributed detection of node replication
requires fewer number of samples to arrive                   attacks in sensor networks. In IEEE S&P,
                                                             May 2005.

                                                                                          414 | P a g e
Abhinaya.E.V / International Journal of Engineering Research and Applications
                  (IJERA)             ISSN: 2248-9622       www.ijera.com
                       Vol. 3, Issue 2, March -April 2013, pp.410-415
[8]    Y. Sun, Z. Han, W. Yu, and K. Liu. A trust
       evaluation framework in distributed
       networks: vulnerability analysis and
       defense against attacks In IEEE
       INFOCOM, April 2006.
[9]    A. Wald. Sequential analysis. Dover
       Publications, 2004.
[10]   Y. Yang, X. Wang, S. Zhu, and G. Cao.
       Distributed software-basedattestation for
       node compromise detection in sensor
       networks. In IEEE SRDS, October 2007.
[11]   W. Zhang, M. Tran, S. Zhu, and G. Cao. A
       random perturbation-based scheme for
       pairwise key establishment in sensor
       networks. In ACM Mobihoc, September
       2007.
[12]   M.G.Zapata, “Secure Adhoc On-Demand
       Distance Vector (SAODV) Routing”,
       IETF MANET Mailing List, October 2001.
[13]   Y.C.Hu,      A.Perigg and D.B.Johnson,
       “Wormhole detection in wireless adhoc
       networks,” Department of Computer
       Sciience, Rice University, June 2002.
[14]   F.Ye, A.Chen, S.Lu and L.Zhang,”A
       scalable solution to minimum cost
       forwarding in large sensor networks”, in
       Tenth International Conference on
       Computer Communications and Networks,
       2001.




                                                                               415 | P a g e

More Related Content

What's hot

Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSpharmaindexing
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networksPriya Kaushal
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
Infrastructure Establishment
Infrastructure EstablishmentInfrastructure Establishment
Infrastructure Establishmentjuno susi
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKNishant Bhardwaj
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Mumbai Academisc
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wirelessIJCNCJournal
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 

What's hot (19)

Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Infrastructure Establishment
Infrastructure EstablishmentInfrastructure Establishment
Infrastructure Establishment
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
Intrusion detection in homogeneous and heterogeneous wireless sensor networks...
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wireless
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 

Viewers also liked

Viewers also liked (20)

Bb32351355
Bb32351355Bb32351355
Bb32351355
 
B32006009
B32006009B32006009
B32006009
 
Ac32195204
Ac32195204Ac32195204
Ac32195204
 
Bi32385391
Bi32385391Bi32385391
Bi32385391
 
Aa32182188
Aa32182188Aa32182188
Aa32182188
 
Aq32287294
Aq32287294Aq32287294
Aq32287294
 
Bv32457460
Bv32457460Bv32457460
Bv32457460
 
Ay32333339
Ay32333339Ay32333339
Ay32333339
 
Bp32425428
Bp32425428Bp32425428
Bp32425428
 
Bola na rede: a influência das novas mídias na popularização do futebol
Bola na rede: a influência das novas mídias na popularização do futebolBola na rede: a influência das novas mídias na popularização do futebol
Bola na rede: a influência das novas mídias na popularização do futebol
 
Día del trabajador
Día del trabajadorDía del trabajador
Día del trabajador
 
Valorização profissional: primeiro compromisso do gestor de policiamento prev...
Valorização profissional: primeiro compromisso do gestor de policiamento prev...Valorização profissional: primeiro compromisso do gestor de policiamento prev...
Valorização profissional: primeiro compromisso do gestor de policiamento prev...
 
Diga não as drogas
Diga não as drogasDiga não as drogas
Diga não as drogas
 
Suckerpunch
SuckerpunchSuckerpunch
Suckerpunch
 
Cuestionario2
Cuestionario2Cuestionario2
Cuestionario2
 
Carta de Conjuntura do Ipea
Carta de Conjuntura do IpeaCarta de Conjuntura do Ipea
Carta de Conjuntura do Ipea
 
Presentación Granada 2º
Presentación Granada 2ºPresentación Granada 2º
Presentación Granada 2º
 
Nuestra historia
Nuestra historiaNuestra historia
Nuestra historia
 
Practica m5
Practica m5Practica m5
Practica m5
 
Red
RedRed
Red
 

Similar to Detecting and Revoking Compromised Nodes in Zoned WSN

Building Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology ModelBuilding Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology ModelIJAAS Team
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...IISRTJournals
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkIISRT
 
Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Amy Alexander
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Deep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNsDeep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNsIRJET Journal
 
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...ijwmn
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )Joanna Paulsen
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...IRJET Journal
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 

Similar to Detecting and Revoking Compromised Nodes in Zoned WSN (20)

Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
Building Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology ModelBuilding Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology Model
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
FINAL
FINALFINAL
FINAL
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Deep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNsDeep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNs
 
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
 
Ii2414621475
Ii2414621475Ii2414621475
Ii2414621475
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 

Detecting and Revoking Compromised Nodes in Zoned WSN

  • 1. Abhinaya.E.V / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.410-415 Compromised Node Detection and Revocation in Zone Framed Networks for Wireless Sensor Networks Abhinaya.E.V¹ Post Graduate Student Department of Electronics and Communication K.Ramakrishnan College Of Engineering,India ABSTRACT Sensor nodes are usually deployed in an communication and computation capabilities; large open environment therefore they are subjected to number of them may collectively monitor the various kinds of attacks like Worm Hole attack, physical world, disseminate information upon Black Hole attack, False Data Injection attacks. critical environmental events and process the Since the attackers can cause disruption and information on the fly. failure to the network, it’s very important to detect these compromised nodes and revoke them The issues of network lifetime and data before any major disruption occurs. Therefore, availability are extremely important in WSN due to it’s very important to safe guard the network their deployment in hostile environment. The system from further disruption. For this purpose a should provide fault tolerant energy efficient real- method called Biased SPRT (Sequential time communication as well as automatic and Probability Ratio Test) is used by setting up some effective action in crisis situations. A typical sensor Threshold Value and Trust Aggregator in the network operates in five phases which are planning network scenario for which the network is phase, deployment phase, post-deployment phase, divided into number of Zones. operation phase and post-operation phase. Key terms – Compromised Node, SPRT, B-SPRT, a. In planning phase, a site survey is conducted to Trust Aggregator, Zones, False Positives, False evaluate deployment environment and its Negatives. conditions to select a suitable deployment mechanism. I.INTRODUCTION b. In deployment phase, sensors are randomly Wireless Sensor Networks (WSNs) deployed over a target region. have emerged as a research areas with an c. In post-deployment phase, the sensor networks overwhelming effect on practical application operators need to identify or estimate the developments. They permit fine grain observation of location of sensors to access coverage. the ambient environment at an economical cost d. The operation phase involves the normal much lower than currently possible. In hostile operation of monitoring tasks where sensors environments where human participation may be too observe the environment and generate data. dangerous sensor networks may provide a robust e. The post-oeration phase involves shutting down service. Sensor networks are designed to transmit and preserving the sensors for future operations data from an array of sensor nodes to a data or destroying the sensor network. repository on a server. The advances in the integration of micro-electro-mechanical system The sensor nodes consist of sensing, data (MEMS), microprocessor and wireless processing and communicating components. They communication technology have enabled the can be used for continuous sensing, event detection deployment of large-scale wireless sensor as well as identification, location sensing and networks[1]. WSN has potential to design many control of actuators. The nodes are deployed either new applications for handling emergency, military inside the phenomenon or very close to it and can and disaster relief operations that requires real time operate unattended. They can use their processing information for efficient coordination and abilities to locally carry out simple computations planning.sensors are devices that produce a and transmit only required and partially processed measurable response to a change in a physical data. They may be organized into clusters or condition like temperature, humidity, pressure etc. collaborate together to complete a task that is issued WSNs may consist of many different types of by the users. In addition, positions of these nodes do sensors such as seismic, magnetic, thermal, visual, not need to be predefined[1][2]. These allow their infrared, acoustic and radar, capable to monitor a random deployment in inaccessible terrains or wide variety of ambient conditions. Though each disaster relief operations. The WSN provides an individual sensor may have severe resource intelligent platform to gather and analyze data constraint in terms of energy, memory, without human intervention. As a result, WSN’s 410 | P a g e
  • 2. Abhinaya.E.V / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.410-415 have a wide range of applications such as military scheme facilitates node compromise detection and applications, to detect and track hostile objects in a revocation by leveraging zone trust information. In battle field or in environmental research the first scenario specifically, we divide the whole applications, to monitor a disaster as seismic tremor, network into a number of zones randomly like a tornado or a flood or for industrial applications, to Z1,Z2,Z3,.....For each zone a Trust Aggregator(TA) guide and diagnose robots or machines in a factory is assigned for a particular time slot. The Trust or for educational applications, to monitor Aggregator is responsible for collecting the log developmental childhood or to create a problem information’s from all the nodes available in that solving environment. particular zone for that particular time slot. Once it fetches all the informations’s then the Trust Main idea of this paper is to detect the Aggregator sends the report to Base Station(BS). compromised nodes using Sequential Hypothesis This way all the Trust Aggregator of different zones Testing (SPRT). Two scenarios are checked here. In sends their report to Base Station. At Base Station, first scenario, the whole network is divided all reports from different zones are checked. Each randomly into some number of zones where reports contains some particular Trust Value(TV) software attestation is performed over the affected which is checked in accordance to a Threshold zone with maximum number of untrustworthy nodes Value(TV) set prior at Base Station. Once the Trust which consumes more energy and provides more value is below the given Threshold Value, the delay whereas in second scenario the whole scenario corresponding node can participate in further is divided into low trust samples and high trust transmissions and receptions. But, if the Trust Value samples where only high trust samples are used in of particular node is higher than the given Threshold transmission and reception. This is performed using Value, that particular node is said to be Biased SPRT. Since only high trust samples are Compromised Node(CN) or Malicious Node(MN) used the problem of compromising is restricted. or Untrustworthy Node(UN). This particular node is Hence it provides better results than the previous considered as affected. The Zone with maximum scenario. compromised nodes are said to be affected zone. The affected nodes in that particular zone can be II. MODEL restored by performing Software Attestation A two-dimensional static sensor network is schemes. This Software Attestation Scheme checks assumed in which sensor nodes do not change their for the subverted module and programs and restores locations after deployment since they are immobile. them using SPRT. In this case, large delay is noticed Their locations can be obtained by using some as each node’s log information has to be collected Secure Localization Schemes. We also assume that every time. Also, overhead and energy consumption the link between all sensors is bidirectional as they is high. can perform both transmission and reception. Let’s assume an Adversary attacks a set of nodes in each In second scenario the whole network is Zone. However, we limit on his attack capability considered into two set of samples: low trust such that he does not compromise a majority of the samples and high trust samples where only high nodes in each region. This is reasonable, since samples are considered to take part in the network compromising a majority of sensor nodes in a region transmission using Biased SPRT. Therefore, less is far from optimal. This is mainly because his delay and less energy is consumed compared to influence is limited to the region while he spends previous scenario. substantial time and effort to compromise many nodes. The same time and effort could instead be IV. PROTOCOL DESCRIPTION used to spread out compromised nodes over a wider area and cause greater disruption to the network. A. Network Formation A network is divided into a set of zones III. DECTECTION AND REVOCATION with Trust Values and untrustworthy zone is OF COMPROMISED NODES detected in accordance with the zone Trust Values. Reputation-based trust management Once a zone is found to be affected or untrustworthy schemes do not stop compromised nodes from doing then software attestation is performed by the malicious activities in the network[2][3][4][5]. Also, network operator over all the sensor nodes present existing schemes based on software attestation in that particular zone. Since, the software require each sensor to be periodically attested attestation is performed over all the nodes including because it cannot be predicted when attacker the Honest nodes/Trustworthy nodes along with compromises sensors. The periodic attestation of compromised nodes, only in untrustworthy nodes it individual nodes will incur large overhead in terms incurs less overhead. In our scheme, specifically of computation and communication[2]. To mitigate SPRT method is used as this method depends on these limitations, we propose a zone-framed node multiple evidences rather than single evidence. compromise detection and revocation scheme. Our Also, its known fact that multiple evidences 411 | P a g e
  • 3. Abhinaya.E.V / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.410-415 produces accurate result when compared to single B. Trust Aggregator Setup and Trust evidence. Therefore this statistical method is chosen Evaluation which contains two limits namely null hypothesis The network considered here is static and alternate hypothesis. These two limits play network which contains sensor node s with fixed major role in determining the correct results. When location. The sensor node s discovers the ID’s of the Trust Value is less than the given Threshold its neighbouring nodes and establishes pairwise Value, it is considered to be null hypothesis and it secret keys with them. The Trust Aggregator is can be included in the upcoming process whereas selected(TA) in round robin manner using when the Trust Value is greater than the Threshold pseudorandom number. Each node acts TA in its Value, it is considered as affected requiring given duty time slot and the starting time of each revocation. The main advantage of using SPRT is node is same providing same permutations. For that correct decision can be reached at very shorter each time slot Ti, one node act as Trust Aggregator time providing low false positives and false by collecting the log information of all negatives. neighbouring nodes and also includes its own log information which are together called as Trust The network operator assigns each node Reports. The more information is shared between with unique ID and preloads each and every sensor the nodes, the more will be the trust level. node with shared secret keys to communicate with Neighbouring nodes are represented using s . Base Station and pair-wise keys to communicate between themselves[6][11]. Zone area plays an TABLE 1 important role in estimating the cost of the system. COMMON PARAMETERS ADOPTED IN THE For example, if the zone size is small it would not SIMULATION be possible to place all the nodes within the zone Parameters Values without causing some disruptions. And if the zone is huge, the intra-communication between the nodes 1000*1000 require multiple hops which increases the cost of the Simulation area m system[12][13]. Therefore, zone is taken in the form of square whose perimeter is P such that the Number of nodes 100 diagonal is √2P equal to the communication range and the optimal zone size is √2P/2. Transmission range 250m Network Formation Simulation duration 150ms Zone Segmentation Mobility model Random waypoint Trust Calculation Propagation Two way ground Performance Analysis Fig. 1 Basic block diagram of 1st scenario using C. Detection and Revocation SPRT Each TA sends its trust reports to the Base- Station along with fresh time stamp. Hence, here The network operator assigns each node replay attacks can be avoided[7]. As already the BS with unique ID and preloads each and every sensor is maintaining the list TA’s neighbouring lists, it node with shared secret keys to communicate with would be easier for the BS to detect most affected Base Station and pair-wise keys to communicate zone with maximum number of affected sensor between themselves[6][11]. Zone area plays an nodes. For this purpose basic simple SPRT is used important role in estimating the cost of the system. which contains both null hypothesis and alternate For example, if the zone size is small it would not hypothesis[8]. When the Trust Value is less than be possible to place all the nodes within the zone Preset Threshold Value, it is considered as null without causing some disruptions. And if the zone is hypothesis and these nodes are eligible to participate huge, the intra-communication between the nodes in further transmissions where as the nodes with require multiple hops which increases the cost of the alternate hypothesis are corrected using some system[12][13]. Therefore, zone is taken in the form available software attestation schemes. The whole of square whose perimeter is P such that the network is divided into two sets of samples low trust diagonal is √2P equal to the communication range samples and high trust samples. The sensor nodes and the optimal zone size is √2P/2. with low trust values are not allowed to participate in the transmission and reception process in Biased- 412 | P a g e
  • 4. Abhinaya.E.V / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.410-415 SPRT. Instead only high trust values are used transmitting and receiving. The main three metrics exclusively. Since only high trust samples are taken used to evaluate the performance are Number of into consideration the probability of false positive reports, False positives, False negatives. Number of and false negative is lesser compared to the first reports is the zone trust reports sent by TA to the scenario of simple SPRT. Also delay, throughput BS. False positive is the error probability that a results are better than the first scenario. trustworthy zone is impersonated as untrustworthy zone. False negative is the error probability that a untrustworthy zone is misidentified as trustworthy. Network Formation Performance parameters like delay, throughput, energy consumption etc simulated using Network Simulator2(NS2) of version 2.26. The simulated Network divided into zones graphs clearly shows that delay is lesser and Each TA sends its trust throughput is also better in Biased-SPRT. reports to the Base-Station Assigning ID and Trust Values along with fresh time Assigning Pseudorandomhere replayeach node stamp. Hence, number for attacks can be avoided[7]. One node is selected as Trust Aggregator(TA) As already the BS is maintaining the list TA’s TA sends Trust Value Reports to Base Station neighbouring lists, it would be easier for the BS Trust detectAnalysis using SPRT to value most affected zone with maximum No number of affected sensor Fig. 3 False Positive nodes. IfFor this purpose Trust Value basic simple SPRT is used >Trust Threshold which contains both null Yes hypothesis and alternate hypothesis[8]. When the sss Software of all the nodes less than zone Trust Value is in affected is attested Preset Threshold Value, it is considered as null Recovery hypothesis and these nodes are eligible to participate in further transmissions where as the nodes with alternate hypothesis are Fig. 4 False Negative corrected using some available software attestation schemes. The whole network is divided into two sets of samples low trust samples and high trust samples. The sensor nodes with low trust Fig. 2 Flow diagram ofare not scenario using SPRT values the 1st allowed to participate in the Fig. 5 Simulation time Vs Received Packet transmission and reception V.SIMULATION RESULTS The network in Biased-SPRT. process environment contains 100 nodes for simulation within high trust area of Instead only a network 1000*1000m.The simulation time usedsimulation values are or duration is 150ms and the propagationonly chosen exclusively. Since model is a Two way ground model capable of both high trust samples are taken into consideration the probability of false 413 | P a g e positive and false negative is lesser compared to the first scenario of simple
  • 5. Abhinaya.E.V / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.410-415 at a correct decision than the simple SPRT used in first scenario. The performance of Biased-SPRT is comparatively better than the result of first scenario. First scenario with Sequential Hypothesis Testing(SPRT) gives 78.6% of correct performance and second scenario with Biased-SPRT provides 83.4%. Future enhancement method will be Policy Enforcing Protocol first, policy implementation in the multi- tier networks is entirely distributed without relying on any central trusted choke points. Second, the trusted networks are self- organized. They can be established and managed spontaneously without requiring pre-deployed trusted entities or centralized management. Third, the multi-level trust Fig.6 Simulation time Vs Throughput enables flexible enforcement of complex policies, which can be defined across various interdependent protocols and enforced independently. ACKNOWLEDGEMENT The authors would like to thank Dr.A.Varadarajan, Deputy Director of IGNOU, Chennai for his full cooperation for providing us with good faculties and thanks to all anonymous reviewers for their valuable suggestions and comments. REFERENCES [1] S.Capkun and J.P. Hubaux. Secure positioning in wireless networks. IEEE Journal on Selected Areas in Fig. 7 Pause time Vs Total remaining energy Communications, 24(2):221–232, February 2006. [2] S.Ganeriwal and M. Srivastava. Reputation-based framework for high integrity sensor networks. In ACM SASN, October 2004. [3] J. Ho, M. Wright, and S.K. Das. Fast Detection of Replica Node Attacks in Sensor Networks Using Sequential Analysis. In IEEE INFOCOM,April 2009. [4] X. Hu, T. Park, and K. G. Shin. Attack- tolerant time-synchronization in wireless sensor networks. In IEEE INFOCOM, April 2008. [5] J. Jung, V. Paxon, A.W. Berger, and H. Balakrishnan. Fast port scan detection using sequential hypothesis testing. In Fig.8 Average number of reports and IEEE S&P, May 2004. Error rates (fc-fraction of compromised [6] Z. Li, W. Trappe, Y. Zhang, and B. Nath. nodes) Robust statistical methods for securing wireless localization in sensor networks. In VI.CONCLUSION AND FUTURE IEEE IPSN, April2005. ENHANCEMENT [7] B. Parno, A. Perrig, and V.D. Gligor. We infer that the Biased-SPRT Distributed detection of node replication requires fewer number of samples to arrive attacks in sensor networks. In IEEE S&P, May 2005. 414 | P a g e
  • 6. Abhinaya.E.V / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.410-415 [8] Y. Sun, Z. Han, W. Yu, and K. Liu. A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks In IEEE INFOCOM, April 2006. [9] A. Wald. Sequential analysis. Dover Publications, 2004. [10] Y. Yang, X. Wang, S. Zhu, and G. Cao. Distributed software-basedattestation for node compromise detection in sensor networks. In IEEE SRDS, October 2007. [11] W. Zhang, M. Tran, S. Zhu, and G. Cao. A random perturbation-based scheme for pairwise key establishment in sensor networks. In ACM Mobihoc, September 2007. [12] M.G.Zapata, “Secure Adhoc On-Demand Distance Vector (SAODV) Routing”, IETF MANET Mailing List, October 2001. [13] Y.C.Hu, A.Perigg and D.B.Johnson, “Wormhole detection in wireless adhoc networks,” Department of Computer Sciience, Rice University, June 2002. [14] F.Ye, A.Chen, S.Lu and L.Zhang,”A scalable solution to minimum cost forwarding in large sensor networks”, in Tenth International Conference on Computer Communications and Networks, 2001. 415 | P a g e