Post on 05-Apr-2018
7/31/2019 Fast Detection
1/23
Fast Detection of Mobile Replica NodeAttacks in Wireless Sensor Networks
Using Sequential Hypothesis
Testing
N.Anitha (10208104003)
J.Jayakodi (10208104027)
S.Monisha (10208104045)
7/31/2019 Fast Detection
2/23
A fast and effective mobile replica node detection.
To detect replica node attacks
Sequential Probability Ratio Test (SPRT)
Aim
7/31/2019 Fast Detection
3/23
Sensor nodes report to base station.
Malicious attacks in sensor networks.
Dangerous attack is the replica node attack.
Time and effort.
Abstract
7/31/2019 Fast Detection
4/23
Tackle the problem of replica node.
Encrypt, decrypt and authenticate.
Clocks of all nodes are loosely synchronized.
Base station communication.
7/31/2019 Fast Detection
5/23
Domain
MOBILE COMPUTING
Mobile replica node detection.
Obtaining the distance information.
Communication is bidirectional.
Null and Hypothesis testing problem.
7/31/2019 Fast Detection
6/23
Modules :
Neighbour node detection.
Data communication.
Attacker models.
7/31/2019 Fast Detection
7/23
Hardware requirements :
Windows operating systems.
Jdk 1.6
JavaFX 1.3
Software requirements :
Hard disk : 40GB and above.
RAM : 512MB and above.
Processor : pentium iv and above
7/31/2019 Fast Detection
8/23
Existing System
Static sensor networks.
Static nodes mimic the movement.
No encryption and decryption.
7/31/2019 Fast Detection
9/23
Proposed System
Nodes to encrypt, decrypt and authenticate communications.
Sequential Hypothesis Test (SHT).
Sensor networks in various applications.
Detection accuracy.
Capture the original node.
7/31/2019 Fast Detection
10/23
Detecting the neighbour nodes.
Tolerate potentially compromised source nodes.
Two asynchronous phases.
Secure Single hop pair wise synchronization.
Secure and global time synchronization.
7/31/2019 Fast Detection
11/23
Architecture Diagram
AN-Attack node
Normal data
Attack data
Base Station
SN SN SN
ANSN
SN
7/31/2019 Fast Detection
12/23
Two-dimensional mobile sensor network
System-configured maximum speed
Mobile sensor network communicate with a base station
Neighbour node detection
7/31/2019 Fast Detection
13/23
Data communication
Bidirectional
Normal data communication
Elliptic curve cryptography Algorithm
7/31/2019 Fast Detection
14/23
Attacker Models
Sequential Hypothesis Testing
Null hypothesis
Alternative hypothesis
7/31/2019 Fast Detection
15/23
Literature Survey
S.No
Title, Author,Publication name, year
Inference of thepaper
Conclusion
1. TITLE: LocalizedMulticast: Efficient and
Distributed ReplicaDetection in Large-Scale Sensor NetworksBY:BoZhu;Setia.S, Jajodia.S,
Roy.S.,Lingyu Wang;
Publication name:Mobile Networks and
Applications,
vol :9 Issue:7. pp. 913 -926
YEAR: July 2010
Efficient in
communication and
memory costs inlarge-scale sensor
networks, and at
the same time
achieves a higher
probability of
detecting nodereplicas.
Localized Multicast
is used for
detecting nodereplication attacks .
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=54667397/31/2019 Fast Detection
16/23
S.N
o
Title, Author,
Publication name, year
Inference of the
paper
Conclusion
2. TITLE: Controlled Wi-FiSharing in Cities: ADecentralizedApproach Relying onIndirect Reciprocity
BY:Efstathiou,E.C.Franoudis,
P.A.Polyzos.
Publication name:Mobile Networks andApplications,
vol :9 Issue:7. pp. 1147 -1160
YEAR:Aug. 2010
the provision of
citywide broadband
communication
capability to mobile
users through
private Wi-Fi
networks that are in
range but belong to
others.
club algorithms are
used in
decentralized
approach.
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=54667397/31/2019 Fast Detection
17/23
S.No
Title, Author,Publication name, year
Inference of thepaper
Conclusion
3. TITLE: MulticastAuthentication Based
on Batch Signature
BY:Yun Zhou; Xiaoyan
Zhu; Yuguang Fang;
Publication name:Mobile Networks and
Applications,vol :9 Issue:7. pp. 982 -993
YEAR: July 2010
Eliminates the
correlation among
packets and thusprovides the perfect
resilience to packet
loss
Efficient
cryptographic
primitive calledbatch signature is
used for
authentication.
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=54667397/31/2019 Fast Detection
18/23
S.No
Title, Author,Publication name, year
Inference of thepaper
Conclusion
4. TITLE: Secure DataCollection in Wireless
Sensor Networks UsingRandomized Dispersive
Route
BY: Tao Shu; Krunz,M.; Sisi Liu; ;
Publication name:
Mobile Networks andApplications,
vol :9 Issue:7. pp. 941 -954
YEAR: July 2010
data delivery
mechanisms that
can withstand highprobability black
holes formed by
Compromised node
and denial of
service attacks. .
optimization
problem to
minimize the end-to-end energy
consumption
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=54667397/31/2019 Fast Detection
19/23
S.No
Title, Author,Publication name, year
Inference of thepaper
Conclusion
5. TITLE: Virtual Energy-Based Encryption and
Keying for WirelessSensor Networks
BY:Uluagac.A.S.;Beyah.R.A.;YingshuLi;
Copeland,J.A.;
Publication name
: Mobile Networksand Applications,
vol :9 Issue:7. pp. 994 -1007
YEAR: July 2010
Designing cost-
efficient, secure
network protocolsfor Wireless Sensor
Networks (WSNs).
VEBEK is able to
efficiently detect
and filter false datainjected into the
network by
malicious
outsiders.
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=54667397/31/2019 Fast Detection
20/23
Application and Future Enhancement
Replica detection scheme for mobile sensor networks based on
the SPRT.
Showed the limitations of a group attack strategy in which the
attacker controls the movements of a group of replicas..
7/31/2019 Fast Detection
21/23
d23hwgftur
My nameMy position, contact information
or project description
conclusion
Limitations of attackers strategy.
Limit on the amount of time.
Nash equilibrium.
7/31/2019 Fast Detection
22/23
References
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, Efficient and Distributed
Detection of Node Replication Attacks in Mobile Sensor Networks,
Proc. IEEE Vehicular Technology Conf. Fall (VTC Fall), Sept.2009.
G. Theodorakopoulos and J.S. Baras, Game Theoretic Modeling
of Malicious Users in Collaborative Networks, IEEE J. Selected
Areas in Comm., vol. 26, no. 7, pp. 1317-1326, Sept. 2008.
H. Wang, B. Sheng, C.C. Tan, and Q. Li, Comparing Symmetric-
Key and Public-Key Based Security Schemes in Sensor Networks:
A Case Study of User Access Control, Proc. IEEE Intl Conf.
Distributed Computing Systems (ICDCS), pp. 11-18, June 2008.
K. Xing, F. Liu, X. Cheng, and H.C. Du, Real-Time Detection of
Clone Attacks in Wireless Sensor Networks, Proc. IEEE Intl Conf.
Distributed Computing Systems (ICDCS), pp. 3-10, June 2008.
7/31/2019 Fast Detection
23/23