Fast Detection

download Fast Detection

of 23

Transcript of Fast Detection

  • 7/31/2019 Fast Detection

    1/23

    Fast Detection of Mobile Replica NodeAttacks in Wireless Sensor Networks

    Using Sequential Hypothesis

    Testing

    N.Anitha (10208104003)

    J.Jayakodi (10208104027)

    S.Monisha (10208104045)

  • 7/31/2019 Fast Detection

    2/23

    A fast and effective mobile replica node detection.

    To detect replica node attacks

    Sequential Probability Ratio Test (SPRT)

    Aim

  • 7/31/2019 Fast Detection

    3/23

    Sensor nodes report to base station.

    Malicious attacks in sensor networks.

    Dangerous attack is the replica node attack.

    Time and effort.

    Abstract

  • 7/31/2019 Fast Detection

    4/23

    Tackle the problem of replica node.

    Encrypt, decrypt and authenticate.

    Clocks of all nodes are loosely synchronized.

    Base station communication.

  • 7/31/2019 Fast Detection

    5/23

    Domain

    MOBILE COMPUTING

    Mobile replica node detection.

    Obtaining the distance information.

    Communication is bidirectional.

    Null and Hypothesis testing problem.

  • 7/31/2019 Fast Detection

    6/23

    Modules :

    Neighbour node detection.

    Data communication.

    Attacker models.

  • 7/31/2019 Fast Detection

    7/23

    Hardware requirements :

    Windows operating systems.

    Jdk 1.6

    JavaFX 1.3

    Software requirements :

    Hard disk : 40GB and above.

    RAM : 512MB and above.

    Processor : pentium iv and above

  • 7/31/2019 Fast Detection

    8/23

    Existing System

    Static sensor networks.

    Static nodes mimic the movement.

    No encryption and decryption.

  • 7/31/2019 Fast Detection

    9/23

    Proposed System

    Nodes to encrypt, decrypt and authenticate communications.

    Sequential Hypothesis Test (SHT).

    Sensor networks in various applications.

    Detection accuracy.

    Capture the original node.

  • 7/31/2019 Fast Detection

    10/23

    Detecting the neighbour nodes.

    Tolerate potentially compromised source nodes.

    Two asynchronous phases.

    Secure Single hop pair wise synchronization.

    Secure and global time synchronization.

  • 7/31/2019 Fast Detection

    11/23

    Architecture Diagram

    AN-Attack node

    Normal data

    Attack data

    Base Station

    SN SN SN

    ANSN

    SN

  • 7/31/2019 Fast Detection

    12/23

    Two-dimensional mobile sensor network

    System-configured maximum speed

    Mobile sensor network communicate with a base station

    Neighbour node detection

  • 7/31/2019 Fast Detection

    13/23

    Data communication

    Bidirectional

    Normal data communication

    Elliptic curve cryptography Algorithm

  • 7/31/2019 Fast Detection

    14/23

    Attacker Models

    Sequential Hypothesis Testing

    Null hypothesis

    Alternative hypothesis

  • 7/31/2019 Fast Detection

    15/23

    Literature Survey

    S.No

    Title, Author,Publication name, year

    Inference of thepaper

    Conclusion

    1. TITLE: LocalizedMulticast: Efficient and

    Distributed ReplicaDetection in Large-Scale Sensor NetworksBY:BoZhu;Setia.S, Jajodia.S,

    Roy.S.,Lingyu Wang;

    Publication name:Mobile Networks and

    Applications,

    vol :9 Issue:7. pp. 913 -926

    YEAR: July 2010

    Efficient in

    communication and

    memory costs inlarge-scale sensor

    networks, and at

    the same time

    achieves a higher

    probability of

    detecting nodereplicas.

    Localized Multicast

    is used for

    detecting nodereplication attacks .

    http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739
  • 7/31/2019 Fast Detection

    16/23

    S.N

    o

    Title, Author,

    Publication name, year

    Inference of the

    paper

    Conclusion

    2. TITLE: Controlled Wi-FiSharing in Cities: ADecentralizedApproach Relying onIndirect Reciprocity

    BY:Efstathiou,E.C.Franoudis,

    P.A.Polyzos.

    Publication name:Mobile Networks andApplications,

    vol :9 Issue:7. pp. 1147 -1160

    YEAR:Aug. 2010

    the provision of

    citywide broadband

    communication

    capability to mobile

    users through

    private Wi-Fi

    networks that are in

    range but belong to

    others.

    club algorithms are

    used in

    decentralized

    approach.

    http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739
  • 7/31/2019 Fast Detection

    17/23

    S.No

    Title, Author,Publication name, year

    Inference of thepaper

    Conclusion

    3. TITLE: MulticastAuthentication Based

    on Batch Signature

    BY:Yun Zhou; Xiaoyan

    Zhu; Yuguang Fang;

    Publication name:Mobile Networks and

    Applications,vol :9 Issue:7. pp. 982 -993

    YEAR: July 2010

    Eliminates the

    correlation among

    packets and thusprovides the perfect

    resilience to packet

    loss

    Efficient

    cryptographic

    primitive calledbatch signature is

    used for

    authentication.

    http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739
  • 7/31/2019 Fast Detection

    18/23

    S.No

    Title, Author,Publication name, year

    Inference of thepaper

    Conclusion

    4. TITLE: Secure DataCollection in Wireless

    Sensor Networks UsingRandomized Dispersive

    Route

    BY: Tao Shu; Krunz,M.; Sisi Liu; ;

    Publication name:

    Mobile Networks andApplications,

    vol :9 Issue:7. pp. 941 -954

    YEAR: July 2010

    data delivery

    mechanisms that

    can withstand highprobability black

    holes formed by

    Compromised node

    and denial of

    service attacks. .

    optimization

    problem to

    minimize the end-to-end energy

    consumption

    http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739
  • 7/31/2019 Fast Detection

    19/23

    S.No

    Title, Author,Publication name, year

    Inference of thepaper

    Conclusion

    5. TITLE: Virtual Energy-Based Encryption and

    Keying for WirelessSensor Networks

    BY:Uluagac.A.S.;Beyah.R.A.;YingshuLi;

    Copeland,J.A.;

    Publication name

    : Mobile Networksand Applications,

    vol :9 Issue:7. pp. 994 -1007

    YEAR: July 2010

    Designing cost-

    efficient, secure

    network protocolsfor Wireless Sensor

    Networks (WSNs).

    VEBEK is able to

    efficiently detect

    and filter false datainjected into the

    network by

    malicious

    outsiders.

    http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5466739
  • 7/31/2019 Fast Detection

    20/23

    Application and Future Enhancement

    Replica detection scheme for mobile sensor networks based on

    the SPRT.

    Showed the limitations of a group attack strategy in which the

    attacker controls the movements of a group of replicas..

  • 7/31/2019 Fast Detection

    21/23

    d23hwgftur

    My nameMy position, contact information

    or project description

    conclusion

    Limitations of attackers strategy.

    Limit on the amount of time.

    Nash equilibrium.

  • 7/31/2019 Fast Detection

    22/23

    References

    C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, Efficient and Distributed

    Detection of Node Replication Attacks in Mobile Sensor Networks,

    Proc. IEEE Vehicular Technology Conf. Fall (VTC Fall), Sept.2009.

    G. Theodorakopoulos and J.S. Baras, Game Theoretic Modeling

    of Malicious Users in Collaborative Networks, IEEE J. Selected

    Areas in Comm., vol. 26, no. 7, pp. 1317-1326, Sept. 2008.

    H. Wang, B. Sheng, C.C. Tan, and Q. Li, Comparing Symmetric-

    Key and Public-Key Based Security Schemes in Sensor Networks:

    A Case Study of User Access Control, Proc. IEEE Intl Conf.

    Distributed Computing Systems (ICDCS), pp. 11-18, June 2008.

    K. Xing, F. Liu, X. Cheng, and H.C. Du, Real-Time Detection of

    Clone Attacks in Wireless Sensor Networks, Proc. IEEE Intl Conf.

    Distributed Computing Systems (ICDCS), pp. 3-10, June 2008.

  • 7/31/2019 Fast Detection

    23/23