Abstract: still exist. The sensor nodes own limited

Abstract: Cloning detection plays an important role in the area of
security in (Wireless Sensor Network) WSN Detection of any type of clone or interloper
is important in case of WSN. WSN consumes a lot of energy to detect an intruder
or clone node. Therefore we derive an algorithm for energy efficient external
and internal intrusion detection system. We also analyze the probability of
detecting the intruder for heterogeneous WSN. This paper
considers single sensing and multi sensing intruder detection models. It is
found that our experimental results validate the theoretical results. To
achieve successful clone detection, witness selection and legitimacy
verification should fulfill two requirements: 1) witnesses should be randomly
selected 2) at least one of the witnesses can successfully receive all the
verification message(s) for clone detection.

            I proposed an Energy-efficient Ring
based Clone Detection (ERCD) protocol to achieve high clone detection
probability with random witness selection, while ensuring normal network
operations with satisfactory network lifetime of WSNs. The ERCD protocol can be
divided into two stages: witness selection and legitimacy verification. In
witness selection, the source node sends its private information to a set of
witnesses, which are randomly selected by the mapping function. In the
legitimacy verification, verification message along the private information of
the source node is transmitted to its witnesses. If any of witnesses
successfully receives the message, it will forward the message to its witness
header for verification. Upon receive the messages, the witness header compares
the aggregated verification messages with stored records. If multiple copies of
verification messages are received, the clone attack is detected and a
revocation procedure will be triggered.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

 

INTRODUCTION

 

WSN is common in different types of
application scenarios. It includes a set of sensor nodes deployed over a
geographical area to monitor a variety of phenomenons. However, challenges and
difficulties still exist. The sensor nodes own limited power, processing and
sensing ability. The sensor nodes are level to failure because of lack of
power, physical damage etc. Since the information generated by a single node is
usually incomplete or inaccurate, and the applications need joint communication
and computation among multiple sensors multiple sensing models can be used. A
Heterogeneous WSN is more complex as compared to homogeneous WSN and which
consists of a number of sensor nodes of different types deployed in a
particular area and which are collectively working together to achieve a
particular aim. The aim may be any of the physical or environmental condition.
For e.g. the wireless sensor network is mainly used in military applications
such as in borders for finding out the infiltrations. It is also used in
industrial process monitoring and control, machine health monitoring,
environment and habitat monitoring, healthcare applications, home automation
and traffic control. The sensor nodes are tiny and limited in power. Sensor
types vary according to the application of WSN. Whatever be the application,
the resources such as power, memory and band width are limited. Moreover, most
of the sensor nodes are throw away in nature.

                             Intrusion
detection plays an important role in the area of computer security, in
particular network security, so an attempt to apply the idea in WSNs makes a
lot of sense. However, there are currently only a few studies in this area. Da
Silva et al. and Onat and Miri propose similar IDS systems, where certain
monitor nodes in the network are responsible for monitoring their neighbours,
looking for intruders. They listen to messages in their radio range and store
in a buffer specific message fields that might be useful to an IDS system
running within a sensor node.

              The sensor nodes in WSNs are
usually static after deployment, and communicate mainly through broadcast
instead of point-to-point communication. Sensors are deployed in a variety of
domains and some application should be secure from all types of attacks. A lot
of security protocols or mechanisms have been designed for sensor networks. For
example, SPINS (Sensor Protocol for Information via Negotiation), a set of
protocols, provides secure data confidentiality, two-party data authentication,
and data freshness and authenticated broadcast for sensor network. INSENS is an
intrusion tolerant routing protocol for wireless sensor networks.

RELATED WORK

 

 

 

 

The Wireless sensor networks are vulnerable to the
node clone, and several distributed protocols have been proposed to detect this
attack. So they require too strong assumptions to be practical for large-scale,
randomly deployed sensor networks. an adversary can capture a few nodes,
extract code and all secret credentials, and use those materials to clone many
nodes out of off-the-shelf sensor hardware.

SYSTEM
MODEL AND PROBLEM STATEMENT

 

 

In this work, we are implementing RDE protocol, by
location based nodes identification, where every region/location will have a
group leader. The Group leader will generate a random number with time stamp to
the available nodes in that location. Witness nodes verify the random number
and time stamp to detect the cloned node. The message is also encrypted for
security purpose.

 

 

 

CONSTRUCTING
SENSOR NETWORK:

 In this module, we are going to connect the
network .Each node is connected the neighboring node and it is independently
deployed in network area. And also deploy the each port no is authorized in a
node. The design criteria of clone detection protocols for sensor networks
should not only guarantee the high performance of clone detection probability
but also consider the energy and memory efficiency of sensors.

 

PACKET
CREATION:

In
this module, browse and select the source file. And selected data is converted
into fixed size of packets .The packet is send from source to detector. ERCD
protocol outperforms that of other protocols, which is caused by successfully
distributing packets all over the network except the non-witness region to
release the traffic bottleneck around the sink.

 

FIND
AUTHORIZED AND UNAUTHORIZED PORT:

  The intrusion
detection is defined as a mechanism for a WSN to detect the existence of
inappropriate, incorrect, or anomalous moving attackers. In this module check
whether the path is authorized or unauthorized. If path is authorized the
packet is send to valid destination. Otherwise the packet will be deleted.
According port number only we are going to find the path is authorized or
Unauthorized.

CONSTRUCTING
INTER-DOMAIN PACKET FILTERS:

              If
the packet is received from other than the port no it will be filtered   and discarded. This filter only removes the
unauthorized packets and authorized packets send to destination. The ERCD
protocol will trigger a revocation procedure; if no copy is received from the
source node due to packet loss or silent cloned node, transmissions from the
source node will not be permitted.

 

RECEIVING
THE VALID PACKET:

 In this module, after filtering the invalid
packets all the valid Packets will reach the destination. The witnesses can
successfully receive the verification messages from node and cloned nodes. At
last, all the received messages will be forwarded to the witness header to
determine whether the node is cloned or not.

 

 

 

 

 

PROPOSED
METHODOLOGY

.
In Heterogeneous wireless sensor, Intruder detected anywhere in the network

      2. We are detecting the intruder in
multiple sensor heterogeneous wireless sensor                 

         Networks.

      3. An
energy-efficient ring based clone detection (ERCD) protocol to achieve high
clone 

         detection
probability with random witness selection.

      4. The ERCD protocol
can be divided into two stages:

·        
witness selection

·        
Legitimacy verification.

       5. In
witness selection, the source node sends its private information to a set of
witnesses,

          Which are randomly
selected by the mapping function.

       6. 
In the legitimacy verification, verification
message along the private information of 

           the source node
is transmitted to its witnesses.

 

EXISTING METHODOLOGY

1       
In single-sensing
detection, at a time only one intruder detected by the WSN.

2       
Our Previous work was
according to homogeneous and heterogeneous single sensor in wireless sensor
network

3       
The sensor nodes own
limited power, processing and sensing ability.

4       
The sensor nodes are
prone to failure because of lack of power, physical damage etc.

5       
Since the information
generated by a single node is usually incomplete or inaccurate, and the
applications need collaborative communication and computation among multiple
sensors multiple sensing models can be used.

6       
A Heterogeneous WSN is
more complex as compared to homogeneous WSN and which consists of a number of
sensor nodes of different types deployed in a particular area and which are
collectively working together to achieve a particular aim.

7       
The aim may be any of
the physical or environmental condition. For e.g. the wireless sensor network
is mainly used in military applications such as in borders for finding out the
infiltrations.

8       
It is also used in
industrial process monitoring and control, machine health monitoring,
environment and habitat monitoring, healthcare applications, home automation
and traffic control.

9       
WSN become increasingly
useful in variety critical applications, such as environmental monitoring,
smart offices, battlefield surveil- lance and transportation traffic
monitoring.

 

ALGORITHM

 

 

PERFORMANCE ANALYSIS

Storage
Cost and Number of Witnesses

I
analyze the average size of cacheable and the average number of witnesses
theoretically. In our protocol, a claim message would be forwarded to a
deterministic destination node, which should always be a witness if there are
clones, and every node, on average, holds one record in its cacheable for a
claimed node ID as the destination

Those g predecessors, defined as Ei
for i ? 1,g, together with the
destination, occupy a part of periphery of the Chord ring and partition it into
g consecutive segments. Considering the good chance of Chord systems, the
length proportions of g segments in the part of periphery are randomly thin. We
denote the probability of one specific message would go through predecessor Ei
by Pi. A message will pass one of the g predecessors before finally reaching
the destination with probability N?1 N. Therefore, the g probabilities Pi are
randomly distributed under the condition of g i=1 Pi = N?1 N .

CONCLUSION

 

Sensor nodes lack resistant hardware and are
subject to the node clone attack. In this paper, we present two distributed
detection protocols. This probability gives
an insight in to the required number of sensors in a given deployment, their
sensing and transmission range to efficiently detect an intruder in a given
WSN. We have developed an analytical model for intrusion detection and applied
the same into single-sensing detection and multiple sensing detection scenarios
for heterogeneous WSNs. The correctness of the analytical model is proved by
simulation.