SlideShare a Scribd company logo
Neighbour Node Trust Based
Intrusion Detection System for
WSN
Class Seminar
Nov 17
Presented by Hitesh Mohapatra (Ph.D Scholar)
Subject In-Charge Dr.S.Panigrahi
Outline
• Abstract
• Introduction
• Related Work
• The proposed IDS
• Result and discussion and conclusion
• Reference
Abstract
• This seminar presents an intrusion detection technique
based on the calculation of trust of the neighbouring node.
In the proposed IDS, each node observes the trust level of
its neighbour nodes.
• Based on these trust values , neighbour nodes may be
declared as trust worthy, risky or malicious.
• The proposed scheme successfully detects Hello flood
attack, jamming attack and selective forwarding attack by
analysing the network statistics and malicious node
behaviour.
Introduction
Wireless sensor networks
• Wireless sensor node
• power supply
• sensors
• embedded processor
• wireless link
• Many, cheap sensors
• wireless  easy to install
• intelligent  collaboration
• low-power  long lifetime
Possible applications
• Military
• Asset monitoring and management, battlefield
surveillance, biological attack detection
• Ecological
• fire detection, flood detection, agricultural uses
• Health related
• Medical sensing, microsurgery
• General engineering
• car theft detection, inventory control, residential
security
Security in WSN
• Main security threats in WSN are:
• Radio links are insecure – eavesdropping /
injecting faulty information is possible
• Sensor nodes are not temper resistant – if it is
compromised the attacker obtains all security
information
• Protecting confidentiality, integrity, and
availability of the communications and
computations
Why security is different?
•Sensor Node Constraint
•Battery
•CPU power
•Memory
•Networking Constraints and Features
•Wireless
•Ad hoc
•Unattended
Network defense
Protect
- Encryption
- Firewalls
- Authentication
- Biometrics
Detect
- Intrusions
- Attacks
- Misuse of Resources
- Data Correlation
- Data Visualization
- Malicious S/W
- Network Status/
Topology
React
- Response
- Terminate Connections
- Block IPAddresses
- Containment
- Fishbowl
- Recovery
- Reconstitute
What is intrusion detection?
• Intrusion detection is the process of
discovering, analyzing, and reporting
unauthorized or damaging network or
computer activities
• Intrusion detection discovers violations of
confidentiality, integrity, and availability of
information and resources
• Intrusion detection demands:
• As much information as the computing
resources can possibly collect and store
• Experienced personnel who can interpret
network traffic and computer processes
• Constant improvement of technologies and
processes to match pace of Internet
innovation
What is intrusion detection?
How useful is intrusion
detection?
• Provide digital forensic data to support post-
compromise law enforcement actions
• Identify host and network misconfigurations
• Improve management and customer
understanding of the Internet's inherent
hostility
• Learn how hosts and networks operate at the
operating system and protocol levels
Intrusion detection models
• All computer activity and network traffic
falls in one of three categories:
• Normal
• Abnormal but not malicious
• Malicious
• Properly classifying these events are the
single most difficult problem -- even more
difficult than evidence collection
Intrusion detection models
• Two primary intrusion detection models
• Network-based intrusion detection monitors
network traffic for signs of misuse
• Host-based intrusion detection monitors
computer processes for signs of misuse
• So-called "hybrid" systems may do both
• A hybrid IDS on a host may examine network
traffic to or from the host, as well as
processes on that host
IDS paradigms
• Anomaly Detection – look for abnormal
• Misuse Detection – pattern matching
• Burglar Alarms - policy based detection
• Honey Pots - lure the hackers in
• Hybrids - a bit of this and that
Anomaly detection(cont)
• Typical anomaly detection approaches:
• Neural networks - probability-based pattern
recognition
• Statistical analysis - modeling behavior of
users and looking for deviations from the
norm
• State change analysis - modeling system’s
state and looking for deviations from the norm
Core Part
Intrusion Detection for WSN
The proposed intrusion
detection
1. The system has a trust manager, which manage the direct and indirect trust
(reputation) of a node.
2. The behaviour classifier classifies the behaviour of the node as attacker,
trustworthy and risky based on the trust values and calculation obtained from
the trust manager.
3. In case of the trustworthy behaviour, the observed node is recommended to
the forwarding engine for packet forwarding.
4. When behaviour of the observed node is identified as risky, its risk factor is
evaluated and updated. If the observing node is willing to take risk, it
recommends the observed node having risky behaviour to the forwarding
engine for forwarding.
5. If the observing node does not want to take risk, it stores the risk factor of the
observed node in recommendation data base.
6. In case of attack behaviour, the attack classifier distinguishes attack pattern
based on the calculation described in the following subsections.
7. The observed node is declined for forwarding purpose. The status of the
observed nodes is saved in the recommendation data base.
Block Diagram of Proposed
IDS
System Model and nodes
Initial Observation
• In the proposed IDS, a node y0 calculates the level of trust of its
neighbouring nodes.
• The neighbours of y0 is a set of nodes having one hop contact with
node y0 and are represented as
• Any node yi possesses set of attributes denoted as
• The activity of the node yi is observed by the sensor node y0 by
observing its individual attributes.
• The observed attributes of node yi are stored by the vector
with ever element explaining the node’s activities
• If node yi observes its neighbouring nodes
it stores the set of the corresponding attribute vectors
Attributes of WS-Nodes:
• Received Signal Strength
• Packet Sending Rate
• Control Packet Generating Rate
• Packets Delivery Ratio
• Packet Dropping Rate
• Packet Forwarding Rate
• Packet Acknowledgment Rate
Jamming attack
• The amount of power in any radio signal received is
termed as Received Signal Strength.
• The Received Signal Strength of the node y observed by
the node y0 is represented as Ps(y).
• A node is considered malicious if it has high received
signal strength than the vector of received signal
strength of its neighbours Nb(y0)={y1......yn}.
• In this case the node is considered to have undergone a
Jamming attack.
Hello Flood attack
• Packet Generation Rate is the number of control
packets generated in a specific interval of time.
• Pg(y) is the Packet Generation Rate of node y
monitored by the node y0.
• A node is considered malicious if it generates high
number of control packets than the vector of control
packets generated by its neighbours Nb(y0)={y1......yn}.
• In this case, the node is considered to have undergone
a Hello Flood attack.
Selective Forwarding Attack
• In a multi-hop scenario, a node forwards packets of its
neighbours. The rate of packet received by a node and
its subsequent forwarding to its destination node is
termed as Packet Forwarding Rate.
• PFrR(y) is the Packet Forwarding Rate of node y
monitored by the node y0.
• A node is said to be suffering selective forwarding attack
if its packets forwarding rate is much less than the
packets forwarding rate of its neighbour
Nb(y0)={y1......yn}.
Trust
Trust is calculated by taking average of the
direct trust A(y) and indirect trust i.e.
reputation B(y).
Mathematically :
Detection of Jamming Attack
The total Received Signal Strength of node y observed by node y0 during time interval
T0 = Ps0(y)
During time interval T1 = Ps1(y)
Total packet sending rate of node y observed by node y0 during time interval Tz = Psz(y)
Total Received Signal Strength of node y observed by node y0 during time interval Ti =
Psi(y)
Average Received Signal Strength is calculated as
Now at any interval ’i’ if the Received Signal Strength is greater then the summation of
average Received Signal Strength and the Received Signal Strength values of the
sensor specified in its data sheets, node is suffering from jamming Attack.
Mathematically,
{Where Psi(y) is the Received Signal Strength of node y at any given interval i observed
by node y0. C is the Received Signal Strength values of the sensor specified in its data
sheets. Node for which equation 1 does not not hold true, are malicious.}
Detection of Selective
Forwarding Attack
•
Detection of HELLO Flood
Attack
Let Pg0(y) is the control packets generating rate of node y observed by node y0 during
time interval T0. Pg1(y) is the packets generating rate of node y observed by node y0
during time interval T1 and Pgz(y) is the control packets generating rate of node y
observed by node y0 during time interval Tz. Let Pgi(y) ) is the control packets
generating rate of node y observed by node y0 during time interval Ti. Then the average
control packets generating rate is given :
Now at any interval ’i’ if the control packets generating rate of any node is greater then
the summation of average control packets generating rate and the control packets
generating rate values of the sensor specified in the standard protocol, node is suffering
from Hello Flood Attack. Mathematically :
Where Pgi(y) is the control packets generating rate of node y at any given interval i
observed by node y0 . C is the control packets generating rate values of the sensor
specified in the standard protocol it follow. Node for which equation 3 does not hold true,
are malicious and higher control packets generating rate is the identification of hello flood
attack.
• Detection of Trustworthy
(Good) Nodes
A node is said to be trustworthy or Good if its current Direct
Trust value Ac(y) is greater or equal to the required trust
value RTv , meaning that it satisfies the condition :
Detection of Risky Nodes
There are two possibilities about the risky nature of a node.
In the first case, there is no prior recommendation
about the node , that is B(y)=0 and its current direct trust
value Ac(y) is less that the Required Trust Value RTv.
Mathematically: Ac(y) < RTv. In this case, the total trust is
given as and as B(y)=0 so
Then the value of risk is given as :
Detection of Risky Nodes
In the second case, the recommendation value of the node
is less than the value of Required Trust Value that is
B(y) < RTv and its current direct trust value Ac(y) is less
that the Required Trust Value RTv.
Mathematically Ac(y) < RTv. In this case, the total trust is
given as :
Then the value of risk is given by the following equation.
Storage of Node Status for future use
(Reputation) and subsequent Forwarding
Decision
Recommendation Data Base stores the status of the node.
On the bases of calculation, a node may be found
malicious, trustworthy or risky. These statistics are used in
the future interaction of the nodes. A trustworthy node is
recommended for interaction, a malicious node is declined,
while decision about packet forwarding through risky node
is made, if the node intending to send data is willing to take
risk. After the successful determination of the node status
as malicious, trustworthy or risky, decision about the
packet forwarding through any neighbour node is taken by
the packet sending node. The criteria for packet forwarding
is the selection of safest path rather than selecting shortest
path.
Results
The proposed intrusion detection system is implemented
using MATLAB .
Conclusion
We propose an intrusion detection technique based on the
principle that nodes in each other neighbourhood behave
in a similar way. The proposed NeTMids detects hello
flood, jamming and selective forwarding attack. It can be
further extended by including other attacks as well.
Simulation results shows that network perform better when
the proposed NeTMids is deployed.
Thank You to original authors and Dr.S.Panigrahi
Contact:
hiteshmahapatra@gmail.com
Mob:9436992299
Reference
6th International Conference on
Emerging Ubiquitous Systems
and Pervasive Networks,EUSPN-
2015
Neighbour Node Trust Based
Intrusion Detection System for
WSN
Syed Muhammad Sajjada, Safdar
Hussain Boukb, Muhammad
Yousafa
Riphah Institute of Systems
Engineering, Riphah International
University, Islamabad, Pakistan
Department of Electrical
Engineering, Comsats Institute of
Information Technology,
Islamabad, Pakistan

More Related Content

What's hot

Dcgan
DcganDcgan
Dcgan
Brian Kim
 
십분딥러닝_17_DIM(Deep InfoMax)
십분딥러닝_17_DIM(Deep InfoMax)십분딥러닝_17_DIM(Deep InfoMax)
십분딥러닝_17_DIM(Deep InfoMax)
HyunKyu Jeon
 
Anomaly Detection Using Generative Adversarial Network(GAN)
Anomaly Detection Using Generative Adversarial Network(GAN)Anomaly Detection Using Generative Adversarial Network(GAN)
Anomaly Detection Using Generative Adversarial Network(GAN)
Asha Aher
 
Information Extraction
Information ExtractionInformation Extraction
Information Extraction
Rubén Izquierdo Beviá
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
ManageEngine EventLog Analyzer
 
Attention in Deep Learning
Attention in Deep LearningAttention in Deep Learning
Attention in Deep Learning
健程 杨
 
Crafting Recommenders: the Shallow and the Deep of it!
Crafting Recommenders: the Shallow and the Deep of it! Crafting Recommenders: the Shallow and the Deep of it!
Crafting Recommenders: the Shallow and the Deep of it!
Sudeep Das, Ph.D.
 
Misp(malware information sharing platform)
Misp(malware information sharing platform)Misp(malware information sharing platform)
Misp(malware information sharing platform)
Nadim Kadiwala
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
 
Graph Representation Learning
Graph Representation LearningGraph Representation Learning
Graph Representation Learning
Jure Leskovec
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
 
Modern Honey Network (MHN)
Modern Honey Network (MHN)Modern Honey Network (MHN)
Modern Honey Network (MHN)
Jason Trost
 
Recsys 2014 Tutorial - The Recommender Problem Revisited
Recsys 2014 Tutorial - The Recommender Problem RevisitedRecsys 2014 Tutorial - The Recommender Problem Revisited
Recsys 2014 Tutorial - The Recommender Problem Revisited
Xavier Amatriain
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
n|u - The Open Security Community
 
OSINT: analisi dei metadati ed acquisizione da fonti aperte con FOCA e Shodan
OSINT: analisi dei metadati ed acquisizione da fonti aperte con FOCA e ShodanOSINT: analisi dei metadati ed acquisizione da fonti aperte con FOCA e Shodan
OSINT: analisi dei metadati ed acquisizione da fonti aperte con FOCA e Shodan
Danilo De Rogatis
 
Graph Neural Network - Introduction
Graph Neural Network - IntroductionGraph Neural Network - Introduction
Graph Neural Network - Introduction
Jungwon Kim
 
Notes on attention mechanism
Notes on attention mechanismNotes on attention mechanism
Notes on attention mechanism
Khang Pham
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data mining
balbeerrawat
 
Variational Autoencoders VAE - Santiago Pascual - UPC Barcelona 2018
Variational Autoencoders VAE - Santiago Pascual - UPC Barcelona 2018Variational Autoencoders VAE - Santiago Pascual - UPC Barcelona 2018
Variational Autoencoders VAE - Santiago Pascual - UPC Barcelona 2018
Universitat Politècnica de Catalunya
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Sirius
 

What's hot (20)

Dcgan
DcganDcgan
Dcgan
 
십분딥러닝_17_DIM(Deep InfoMax)
십분딥러닝_17_DIM(Deep InfoMax)십분딥러닝_17_DIM(Deep InfoMax)
십분딥러닝_17_DIM(Deep InfoMax)
 
Anomaly Detection Using Generative Adversarial Network(GAN)
Anomaly Detection Using Generative Adversarial Network(GAN)Anomaly Detection Using Generative Adversarial Network(GAN)
Anomaly Detection Using Generative Adversarial Network(GAN)
 
Information Extraction
Information ExtractionInformation Extraction
Information Extraction
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Attention in Deep Learning
Attention in Deep LearningAttention in Deep Learning
Attention in Deep Learning
 
Crafting Recommenders: the Shallow and the Deep of it!
Crafting Recommenders: the Shallow and the Deep of it! Crafting Recommenders: the Shallow and the Deep of it!
Crafting Recommenders: the Shallow and the Deep of it!
 
Misp(malware information sharing platform)
Misp(malware information sharing platform)Misp(malware information sharing platform)
Misp(malware information sharing platform)
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Graph Representation Learning
Graph Representation LearningGraph Representation Learning
Graph Representation Learning
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Modern Honey Network (MHN)
Modern Honey Network (MHN)Modern Honey Network (MHN)
Modern Honey Network (MHN)
 
Recsys 2014 Tutorial - The Recommender Problem Revisited
Recsys 2014 Tutorial - The Recommender Problem RevisitedRecsys 2014 Tutorial - The Recommender Problem Revisited
Recsys 2014 Tutorial - The Recommender Problem Revisited
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
OSINT: analisi dei metadati ed acquisizione da fonti aperte con FOCA e Shodan
OSINT: analisi dei metadati ed acquisizione da fonti aperte con FOCA e ShodanOSINT: analisi dei metadati ed acquisizione da fonti aperte con FOCA e Shodan
OSINT: analisi dei metadati ed acquisizione da fonti aperte con FOCA e Shodan
 
Graph Neural Network - Introduction
Graph Neural Network - IntroductionGraph Neural Network - Introduction
Graph Neural Network - Introduction
 
Notes on attention mechanism
Notes on attention mechanismNotes on attention mechanism
Notes on attention mechanism
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data mining
 
Variational Autoencoders VAE - Santiago Pascual - UPC Barcelona 2018
Variational Autoencoders VAE - Santiago Pascual - UPC Barcelona 2018Variational Autoencoders VAE - Santiago Pascual - UPC Barcelona 2018
Variational Autoencoders VAE - Santiago Pascual - UPC Barcelona 2018
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 

Similar to Neighbor Node Trust Based Intrusion Detection System for WSN

Black hole attack
Black hole attackBlack hole attack
Black hole attack
Richa Kumari
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
chris zlatis
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
raosg
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
Richa Kumari
 
Cryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic networkCryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic network
Shahana P H
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
RABIA ASHRAFI
 
Computational intelligence in wireless sensor network
Computational intelligence in wireless sensor network Computational intelligence in wireless sensor network
Computational intelligence in wireless sensor network
KratikaNigam3
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
Muqeed Abdul
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
Muqeed Abdul
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
Tarek Gaber
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
Prof. Dr. Noman Islam
 
Redundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor NetworksRedundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor Networks
Saeid Hossein Pour
 
Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor Network
Anjan Mondal
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Muhammad Farooq Hussain
 
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSVTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
vtunotesbysree
 
A_Seyedolhosseini_Tir_95_1
A_Seyedolhosseini_Tir_95_1A_Seyedolhosseini_Tir_95_1
A_Seyedolhosseini_Tir_95_1
atefesadat Seyedolhosseini
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
ijtsrd
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor network
Vinayak Raja
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respond
AlgoSec
 
D0952126
D0952126D0952126
D0952126
IOSR Journals
 

Similar to Neighbor Node Trust Based Intrusion Detection System for WSN (20)

Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Cryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic networkCryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic network
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Computational intelligence in wireless sensor network
Computational intelligence in wireless sensor network Computational intelligence in wireless sensor network
Computational intelligence in wireless sensor network
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
 
Redundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor NetworksRedundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor Networks
 
Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor Network
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSVTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
 
A_Seyedolhosseini_Tir_95_1
A_Seyedolhosseini_Tir_95_1A_Seyedolhosseini_Tir_95_1
A_Seyedolhosseini_Tir_95_1
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor network
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respond
 
D0952126
D0952126D0952126
D0952126
 

More from Hitesh Mohapatra

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
Hitesh Mohapatra
 
Automating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine ProvisioningAutomating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine Provisioning
Hitesh Mohapatra
 
Harnessing the Power of Google Cloud Platform: Strategies and Applications
Harnessing the Power of Google Cloud Platform: Strategies and ApplicationsHarnessing the Power of Google Cloud Platform: Strategies and Applications
Harnessing the Power of Google Cloud Platform: Strategies and Applications
Hitesh Mohapatra
 
Scheduling in Cloud Computing
Scheduling in Cloud ComputingScheduling in Cloud Computing
Scheduling in Cloud Computing
Hitesh Mohapatra
 
Cloud-Case study
Cloud-Case study Cloud-Case study
Cloud-Case study
Hitesh Mohapatra
 
RAID
RAIDRAID
Load balancing in cloud computing.pptx
Load balancing in cloud computing.pptxLoad balancing in cloud computing.pptx
Load balancing in cloud computing.pptx
Hitesh Mohapatra
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
Hitesh Mohapatra
 
ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment model
Hitesh Mohapatra
 
Leetcode Problem Solution
Leetcode Problem SolutionLeetcode Problem Solution
Leetcode Problem Solution
Hitesh Mohapatra
 
Leetcode Problem Solution
Leetcode Problem SolutionLeetcode Problem Solution
Leetcode Problem Solution
Hitesh Mohapatra
 
Trie Data Structure
Trie Data Structure Trie Data Structure
Trie Data Structure
Hitesh Mohapatra
 
Reviewing basic concepts of relational database
Reviewing basic concepts of relational databaseReviewing basic concepts of relational database
Reviewing basic concepts of relational database
Hitesh Mohapatra
 
Reviewing SQL Concepts
Reviewing SQL ConceptsReviewing SQL Concepts
Reviewing SQL Concepts
Hitesh Mohapatra
 
Advanced database protocols
Advanced database protocolsAdvanced database protocols
Advanced database protocols
Hitesh Mohapatra
 
Measures of query cost
Measures of query costMeasures of query cost
Measures of query cost
Hitesh Mohapatra
 
Involvement of WSN in Smart Cities
Involvement of WSN in Smart CitiesInvolvement of WSN in Smart Cities
Involvement of WSN in Smart Cities
Hitesh Mohapatra
 
Data Structure and its Fundamentals
Data Structure and its FundamentalsData Structure and its Fundamentals
Data Structure and its Fundamentals
Hitesh Mohapatra
 
WORKING WITH FILE AND PIPELINE PARAMETER BINDING
WORKING WITH FILE AND PIPELINE PARAMETER BINDINGWORKING WITH FILE AND PIPELINE PARAMETER BINDING
WORKING WITH FILE AND PIPELINE PARAMETER BINDING
Hitesh Mohapatra
 

More from Hitesh Mohapatra (20)

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
 
Automating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine ProvisioningAutomating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine Provisioning
 
Harnessing the Power of Google Cloud Platform: Strategies and Applications
Harnessing the Power of Google Cloud Platform: Strategies and ApplicationsHarnessing the Power of Google Cloud Platform: Strategies and Applications
Harnessing the Power of Google Cloud Platform: Strategies and Applications
 
Scheduling in Cloud Computing
Scheduling in Cloud ComputingScheduling in Cloud Computing
Scheduling in Cloud Computing
 
Cloud-Case study
Cloud-Case study Cloud-Case study
Cloud-Case study
 
RAID
RAIDRAID
RAID
 
Load balancing in cloud computing.pptx
Load balancing in cloud computing.pptxLoad balancing in cloud computing.pptx
Load balancing in cloud computing.pptx
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment model
 
Leetcode Problem Solution
Leetcode Problem SolutionLeetcode Problem Solution
Leetcode Problem Solution
 
Leetcode Problem Solution
Leetcode Problem SolutionLeetcode Problem Solution
Leetcode Problem Solution
 
Trie Data Structure
Trie Data Structure Trie Data Structure
Trie Data Structure
 
Reviewing basic concepts of relational database
Reviewing basic concepts of relational databaseReviewing basic concepts of relational database
Reviewing basic concepts of relational database
 
Reviewing SQL Concepts
Reviewing SQL ConceptsReviewing SQL Concepts
Reviewing SQL Concepts
 
Advanced database protocols
Advanced database protocolsAdvanced database protocols
Advanced database protocols
 
Measures of query cost
Measures of query costMeasures of query cost
Measures of query cost
 
Involvement of WSN in Smart Cities
Involvement of WSN in Smart CitiesInvolvement of WSN in Smart Cities
Involvement of WSN in Smart Cities
 
Data Structure and its Fundamentals
Data Structure and its FundamentalsData Structure and its Fundamentals
Data Structure and its Fundamentals
 
WORKING WITH FILE AND PIPELINE PARAMETER BINDING
WORKING WITH FILE AND PIPELINE PARAMETER BINDINGWORKING WITH FILE AND PIPELINE PARAMETER BINDING
WORKING WITH FILE AND PIPELINE PARAMETER BINDING
 

Recently uploaded

john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 

Recently uploaded (20)

john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 

Neighbor Node Trust Based Intrusion Detection System for WSN

  • 1. Neighbour Node Trust Based Intrusion Detection System for WSN Class Seminar Nov 17 Presented by Hitesh Mohapatra (Ph.D Scholar) Subject In-Charge Dr.S.Panigrahi
  • 2. Outline • Abstract • Introduction • Related Work • The proposed IDS • Result and discussion and conclusion • Reference
  • 3. Abstract • This seminar presents an intrusion detection technique based on the calculation of trust of the neighbouring node. In the proposed IDS, each node observes the trust level of its neighbour nodes. • Based on these trust values , neighbour nodes may be declared as trust worthy, risky or malicious. • The proposed scheme successfully detects Hello flood attack, jamming attack and selective forwarding attack by analysing the network statistics and malicious node behaviour.
  • 4. Introduction Wireless sensor networks • Wireless sensor node • power supply • sensors • embedded processor • wireless link • Many, cheap sensors • wireless  easy to install • intelligent  collaboration • low-power  long lifetime
  • 5. Possible applications • Military • Asset monitoring and management, battlefield surveillance, biological attack detection • Ecological • fire detection, flood detection, agricultural uses • Health related • Medical sensing, microsurgery • General engineering • car theft detection, inventory control, residential security
  • 6. Security in WSN • Main security threats in WSN are: • Radio links are insecure – eavesdropping / injecting faulty information is possible • Sensor nodes are not temper resistant – if it is compromised the attacker obtains all security information • Protecting confidentiality, integrity, and availability of the communications and computations
  • 7. Why security is different? •Sensor Node Constraint •Battery •CPU power •Memory •Networking Constraints and Features •Wireless •Ad hoc •Unattended
  • 8. Network defense Protect - Encryption - Firewalls - Authentication - Biometrics Detect - Intrusions - Attacks - Misuse of Resources - Data Correlation - Data Visualization - Malicious S/W - Network Status/ Topology React - Response - Terminate Connections - Block IPAddresses - Containment - Fishbowl - Recovery - Reconstitute
  • 9. What is intrusion detection? • Intrusion detection is the process of discovering, analyzing, and reporting unauthorized or damaging network or computer activities • Intrusion detection discovers violations of confidentiality, integrity, and availability of information and resources
  • 10. • Intrusion detection demands: • As much information as the computing resources can possibly collect and store • Experienced personnel who can interpret network traffic and computer processes • Constant improvement of technologies and processes to match pace of Internet innovation What is intrusion detection?
  • 11. How useful is intrusion detection? • Provide digital forensic data to support post- compromise law enforcement actions • Identify host and network misconfigurations • Improve management and customer understanding of the Internet's inherent hostility • Learn how hosts and networks operate at the operating system and protocol levels
  • 12. Intrusion detection models • All computer activity and network traffic falls in one of three categories: • Normal • Abnormal but not malicious • Malicious • Properly classifying these events are the single most difficult problem -- even more difficult than evidence collection
  • 13. Intrusion detection models • Two primary intrusion detection models • Network-based intrusion detection monitors network traffic for signs of misuse • Host-based intrusion detection monitors computer processes for signs of misuse • So-called "hybrid" systems may do both • A hybrid IDS on a host may examine network traffic to or from the host, as well as processes on that host
  • 14. IDS paradigms • Anomaly Detection – look for abnormal • Misuse Detection – pattern matching • Burglar Alarms - policy based detection • Honey Pots - lure the hackers in • Hybrids - a bit of this and that
  • 15. Anomaly detection(cont) • Typical anomaly detection approaches: • Neural networks - probability-based pattern recognition • Statistical analysis - modeling behavior of users and looking for deviations from the norm • State change analysis - modeling system’s state and looking for deviations from the norm
  • 17. The proposed intrusion detection 1. The system has a trust manager, which manage the direct and indirect trust (reputation) of a node. 2. The behaviour classifier classifies the behaviour of the node as attacker, trustworthy and risky based on the trust values and calculation obtained from the trust manager. 3. In case of the trustworthy behaviour, the observed node is recommended to the forwarding engine for packet forwarding. 4. When behaviour of the observed node is identified as risky, its risk factor is evaluated and updated. If the observing node is willing to take risk, it recommends the observed node having risky behaviour to the forwarding engine for forwarding. 5. If the observing node does not want to take risk, it stores the risk factor of the observed node in recommendation data base. 6. In case of attack behaviour, the attack classifier distinguishes attack pattern based on the calculation described in the following subsections. 7. The observed node is declined for forwarding purpose. The status of the observed nodes is saved in the recommendation data base.
  • 18. Block Diagram of Proposed IDS
  • 19. System Model and nodes Initial Observation • In the proposed IDS, a node y0 calculates the level of trust of its neighbouring nodes. • The neighbours of y0 is a set of nodes having one hop contact with node y0 and are represented as • Any node yi possesses set of attributes denoted as • The activity of the node yi is observed by the sensor node y0 by observing its individual attributes. • The observed attributes of node yi are stored by the vector with ever element explaining the node’s activities • If node yi observes its neighbouring nodes it stores the set of the corresponding attribute vectors
  • 20. Attributes of WS-Nodes: • Received Signal Strength • Packet Sending Rate • Control Packet Generating Rate • Packets Delivery Ratio • Packet Dropping Rate • Packet Forwarding Rate • Packet Acknowledgment Rate
  • 21. Jamming attack • The amount of power in any radio signal received is termed as Received Signal Strength. • The Received Signal Strength of the node y observed by the node y0 is represented as Ps(y). • A node is considered malicious if it has high received signal strength than the vector of received signal strength of its neighbours Nb(y0)={y1......yn}. • In this case the node is considered to have undergone a Jamming attack.
  • 22. Hello Flood attack • Packet Generation Rate is the number of control packets generated in a specific interval of time. • Pg(y) is the Packet Generation Rate of node y monitored by the node y0. • A node is considered malicious if it generates high number of control packets than the vector of control packets generated by its neighbours Nb(y0)={y1......yn}. • In this case, the node is considered to have undergone a Hello Flood attack.
  • 23. Selective Forwarding Attack • In a multi-hop scenario, a node forwards packets of its neighbours. The rate of packet received by a node and its subsequent forwarding to its destination node is termed as Packet Forwarding Rate. • PFrR(y) is the Packet Forwarding Rate of node y monitored by the node y0. • A node is said to be suffering selective forwarding attack if its packets forwarding rate is much less than the packets forwarding rate of its neighbour Nb(y0)={y1......yn}.
  • 24. Trust Trust is calculated by taking average of the direct trust A(y) and indirect trust i.e. reputation B(y). Mathematically :
  • 25. Detection of Jamming Attack The total Received Signal Strength of node y observed by node y0 during time interval T0 = Ps0(y) During time interval T1 = Ps1(y) Total packet sending rate of node y observed by node y0 during time interval Tz = Psz(y) Total Received Signal Strength of node y observed by node y0 during time interval Ti = Psi(y) Average Received Signal Strength is calculated as Now at any interval ’i’ if the Received Signal Strength is greater then the summation of average Received Signal Strength and the Received Signal Strength values of the sensor specified in its data sheets, node is suffering from jamming Attack. Mathematically, {Where Psi(y) is the Received Signal Strength of node y at any given interval i observed by node y0. C is the Received Signal Strength values of the sensor specified in its data sheets. Node for which equation 1 does not not hold true, are malicious.}
  • 27. Detection of HELLO Flood Attack Let Pg0(y) is the control packets generating rate of node y observed by node y0 during time interval T0. Pg1(y) is the packets generating rate of node y observed by node y0 during time interval T1 and Pgz(y) is the control packets generating rate of node y observed by node y0 during time interval Tz. Let Pgi(y) ) is the control packets generating rate of node y observed by node y0 during time interval Ti. Then the average control packets generating rate is given : Now at any interval ’i’ if the control packets generating rate of any node is greater then the summation of average control packets generating rate and the control packets generating rate values of the sensor specified in the standard protocol, node is suffering from Hello Flood Attack. Mathematically : Where Pgi(y) is the control packets generating rate of node y at any given interval i observed by node y0 . C is the control packets generating rate values of the sensor specified in the standard protocol it follow. Node for which equation 3 does not hold true, are malicious and higher control packets generating rate is the identification of hello flood attack.
  • 28. • Detection of Trustworthy (Good) Nodes A node is said to be trustworthy or Good if its current Direct Trust value Ac(y) is greater or equal to the required trust value RTv , meaning that it satisfies the condition :
  • 29. Detection of Risky Nodes There are two possibilities about the risky nature of a node. In the first case, there is no prior recommendation about the node , that is B(y)=0 and its current direct trust value Ac(y) is less that the Required Trust Value RTv. Mathematically: Ac(y) < RTv. In this case, the total trust is given as and as B(y)=0 so Then the value of risk is given as :
  • 30. Detection of Risky Nodes In the second case, the recommendation value of the node is less than the value of Required Trust Value that is B(y) < RTv and its current direct trust value Ac(y) is less that the Required Trust Value RTv. Mathematically Ac(y) < RTv. In this case, the total trust is given as : Then the value of risk is given by the following equation.
  • 31. Storage of Node Status for future use (Reputation) and subsequent Forwarding Decision Recommendation Data Base stores the status of the node. On the bases of calculation, a node may be found malicious, trustworthy or risky. These statistics are used in the future interaction of the nodes. A trustworthy node is recommended for interaction, a malicious node is declined, while decision about packet forwarding through risky node is made, if the node intending to send data is willing to take risk. After the successful determination of the node status as malicious, trustworthy or risky, decision about the packet forwarding through any neighbour node is taken by the packet sending node. The criteria for packet forwarding is the selection of safest path rather than selecting shortest path.
  • 32. Results The proposed intrusion detection system is implemented using MATLAB .
  • 33. Conclusion We propose an intrusion detection technique based on the principle that nodes in each other neighbourhood behave in a similar way. The proposed NeTMids detects hello flood, jamming and selective forwarding attack. It can be further extended by including other attacks as well. Simulation results shows that network perform better when the proposed NeTMids is deployed. Thank You to original authors and Dr.S.Panigrahi Contact: hiteshmahapatra@gmail.com Mob:9436992299
  • 34. Reference 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks,EUSPN- 2015 Neighbour Node Trust Based Intrusion Detection System for WSN Syed Muhammad Sajjada, Safdar Hussain Boukb, Muhammad Yousafa Riphah Institute of Systems Engineering, Riphah International University, Islamabad, Pakistan Department of Electrical Engineering, Comsats Institute of Information Technology, Islamabad, Pakistan