Successfully reported this slideshow.
Miss. Ketaki Deshmukh(Amrutvahini College of Engineering)
•   Introduction•   Existing System•   Proposed System•   Architectural Diagram•   Features•   Application•   Future Scope...
• A sensor node wirelessly sends messages to a  base station via multi-hop path               Fig: Wireless sensor network
• Security of WSNs• Trust Aware Shell :  A robust trust aware routing framework for dynamic   WSNs  provides trustworthy...
• Hackers aggravate network conditions• A traditional techniques does not address the  severe problems:  tampering nodes ...
• Protect WSNs from the harmful attacks exploiting  the replay of routing information• Centres on trustworthiness and ener...
Selective forwardingWormhole attackSinkhole attackSybil attack
Sinkhole Attack                  Wormhole                   Attack
Neighborhood          Table        Neighbor       Energy CostFig. Working of Energy Watcher
ENb = EN–>b + EbENb: Average Energy Cost.EN–>b:Average Energy Cost of successfully delivering a data packet from N to its ...
•Trust manager is to get neighbor trust level from aneighborhood table    Fig: Example To Illustrate Working Of Trust Mana...
Source                                     Destination Node node             Malicious Node                               ...
Fig: Trust manager level table
High ThroughputEnergy efficientScalableAdaptable
Low LatencyNo Balanced Network LoadDenial-Of-Service Attacks cannot be addressed
Mobile Target Detection in the Presence of an Anti-Detection MechanismAuthenticated RoutingNode-to-Node Key AgreementS...
Conclusion
• G. Zhan, W. Shi, and J. Deng, “Tarf: A trust-aware routing framework  for wireless sensor networks,” in Proceeding of th...
Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks
Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks
Upcoming SlideShare
Loading in …5
×

Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

4,666 views

Published on

Published in: Technology

Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

  1. 1. Miss. Ketaki Deshmukh(Amrutvahini College of Engineering)
  2. 2. • Introduction• Existing System• Proposed System• Architectural Diagram• Features• Application• Future Scope• Conclusion• References
  3. 3. • A sensor node wirelessly sends messages to a base station via multi-hop path Fig: Wireless sensor network
  4. 4. • Security of WSNs• Trust Aware Shell : A robust trust aware routing framework for dynamic WSNs provides trustworthy and energy-efficient route effective against harmful attacks
  5. 5. • Hackers aggravate network conditions• A traditional techniques does not address the severe problems: tampering nodes create traffic collision drop or misdirect messages in routes jam the communication channel by creating radio interference
  6. 6. • Protect WSNs from the harmful attacks exploiting the replay of routing information• Centres on trustworthiness and energy efficiency• Allow existing routing protocols to incorporate our implementation• No tight time synchronization & known geographic information
  7. 7. Selective forwardingWormhole attackSinkhole attackSybil attack
  8. 8. Sinkhole Attack Wormhole Attack
  9. 9. Neighborhood Table Neighbor Energy CostFig. Working of Energy Watcher
  10. 10. ENb = EN–>b + EbENb: Average Energy Cost.EN–>b:Average Energy Cost of successfully delivering a data packet from N to its neighbour b.Eb: Energy Cost for b.
  11. 11. •Trust manager is to get neighbor trust level from aneighborhood table Fig: Example To Illustrate Working Of Trust Manager
  12. 12. Source Destination Node node Malicious Node Destination Node Source node (a)Routing requestSource Malicious Nodenode Destination Node (c)Data conformation Response form the destination Response Node 2 Node 1 node (b)Routing response
  13. 13. Fig: Trust manager level table
  14. 14. High ThroughputEnergy efficientScalableAdaptable
  15. 15. Low LatencyNo Balanced Network LoadDenial-Of-Service Attacks cannot be addressed
  16. 16. Mobile Target Detection in the Presence of an Anti-Detection MechanismAuthenticated RoutingNode-to-Node Key AgreementSecure Military ApplicationHealthcare Application
  17. 17. Conclusion
  18. 18. • G. Zhan, W. Shi, and J. Deng, “Tarf: A trust-aware routing framework for wireless sensor networks,” in Proceeding of the 7th European Conference on Wireless Sensor Networks (EWSN’12), 2012.• F. Zhao and L. Guibas, Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann Publishers, 2004.• C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proceedings of the1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003.• M. Jain and H. Kandwal, “A survey on complex wormhole attack in wireless ad hoc networks,” in Proceedings of International Con- ference on Advances in Computing, Control, and Telecommunication Technologies (ACT ’09), 28-29 2009

×