Beruflich Dokumente
Kultur Dokumente
Guide Name: Mrs. L.VEEBA M.E.., AP/CSE, KCET. Submitted by: D.RAMKUMAR M.E CSE , KCET.
Abstract
we create a network based security system create a new security system that provide
full authenticable access. if anonymous user enter into the system it detect itself and improve network efficiency by using scheduling algorithm.
The system monitor overall network transmission ,incoming and outgoing packets.
the data.
we create security system that provide data security and integirity and data
efficiency.
Existing System
Our previous approach using multipath routing algorithm to create multiple dynamic
node(SN).
Each sensor node having own IDS(intrusion detection system) to monitor their neighbor
activities.
Any sensor node doing malicious activity its neighbor sensor node inform to cluster head. All sensor nodes are send their information to their cluster header. Cluster heads take action depends upon SN(sensor nodes) information. Each sensor nodes having own unique id to share personal information.
Proposed System
The proposed approach for ensuring data privacy protection in WSNs through an energy-efficient network backbone is comprised of two phases. we proposed a distance based energy aware routing (DEAR) algorithm on selected optimal path through Ant colony optimization (ACO). The objective of this phase is to balance the available amount of energy in the whole WSNs as well as to maximize the network lifetime. There are a number of reasons that ACO algorithms are a good fit for WSN routing. ACO algorithms are decentralized just as WSNs are similarly decentralized. In WSNs nodes can break, run out of energy and have the radio propagation characteristics change. ACO algorithms have been shown to react quickly to
changes in the network . When the event boost the initialization has to be sent on ACO to initiate the already obtained optimal path. The actual sensed data will be sent under the control of DPP (data privacy protection) for protecting the sensory data readings from malicious.
CONTD..
We are implementing a new system that support both network efficiency and security.
We are implementing new ids(intrusion detection system ) based technique. Our system we are implementing ids on each and every clients. ids is operated
based on certain predefined rules. this rules are early created by the network administrator.
ids monitoring search and every system suppose any miss behavior activities
Advantage
Multipath Routing Algorithm Sometimes Drop A Packets But Provide Full Guaranty
Data Delivery.
It choose a path from already used optimal path so avoid path searching time. Timing efficiency is high. Energy efficiency is very high. Full confidentiality and security.
Network Model:
We create sample network that contain both clients and cluster heads.
Each cluster head act as header. we are giving access control node traceability
Implementing ids.
we are creating ids (intrusion detection system) that support certain predefined rules
system configurations.
DEPLOYING ids.
we are deploy a ids on individual cluster nodes .
ARCHITECTURE DIAGRAM
FUTURE WORK:
For future work, we plan to explore more extensive malicious attacks in addition to packet dropping and bad mouthing attacks, each with different implications to energy, security and reliability, and investigate intrusion detection and multipath routing based tolerance protocols to react to these attacks. Another direction is to consider smart and insidious attackers which can perform more targeted attacks, capture certain strategic nodes with higher
probability, alternate between benign and malicious behavior and collude with other attackers to avoid intrusion detection.
CONCLUSION:
we performed a tradeoff analysis of energy consumption vs. QoS gain in
reliability, timeliness, and security for redundancy management of clustered heterogeneous wireless sensor networks utilizing multipath routing to answer user queries.
Finally, we applied our analysis results to the design of a dynamic redundancy
management algorithm to identify and apply the best design parameter settings at runtime in response to environment changes to prolong the system
lifetime.
SOFTWARE REQUIREMENT
TOOLS USED :JDK 1.6,NETBEANS LANGUAGE : JAVA BACKEND : MY SQL
HARDWARE REQUIREMENT
MONITOR: RGB MONITOR RAM: 1GB HARD DISK :20 GB
REFERENCES:
V. Bhuse and A. Gupta, Anomaly intrusion detection
in wireless sensor networks, J. High Speed Netw., vol. 15, no. 1, pp. 3351, 2006. S. Qun, Power management in networked sensor radios a network energy model, in Proc. 2007 IEEE Sensors Appl. Symp., T. Shu, M. Krunz, and S. Liu, Secure data collection in wireless sensor networks using randomized dispersive routes, IEEE Trans. MobileComput., vol. 9, no. 7, pp. 941954, 2010.
CONTD..
C. J. Fung, Z. Jie, I. Aib, and R. Boutaba, Dirichlet-
based trust management for effective collaborative intrusion detection networks,IEEE Trans. Netw. Service Manage., vol. 8, no. 2, pp. 7991, 2011. F. Bao, I. R. Chen, M. Chang, and J. Cho, Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection, IEEE Trans. Netw. Service Manage.,vol. 9, no. 2, pp. 161183, 2012.
THANK YOU