SECURE WIRELESS SENSOR NETWORKS - ROBUST OF WSN ATTACKS AND SECURE LOCALIZATION
#1

[attachment=15271]
SECURE WIRELESS SENSOR NETWORKS - ROBUST OF WSN ATTACKS AND SECURE LOCALIZATION SCHEME
ABSTRACT
The application of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For location aware WSN applications, it is essential to ensure that sensors can determine their location, even in the presence of malicious adversaries. Our paper mainly projects the problem of enabling sensors of WSN to determine their location in an un-trusted environment. The localization schemes based on distance estimation are expensive for the resource constrained sensors, proposed a range independent localization algorithm. The thumbrule of this algorithm is mainly of the distributed algorithm and does not require any communication among sensors subsequently, it shows that it is robust against severe WSN attacks, such as the wormhole attack, the sybil attack and it compares a threat analysis, performance of it with state-of-the-art range-independent localization schemes. We study the problem of enabling nodes of a wireless sensor network to determine their location even in the presence of malicious adversaries. It is referred to as SecureLocalization. Note that secure localization is a different problemfrom verifying the location claim of a sensor, known as location verification. Location verification is not addressed in this
paper. We consider secure localization in the context of the following design goals: (a) decentralized implementation, (b) resource efficiency, and © robustness against security threats.
SENSOR NETWORKS
Recent technological improvements have made the deployment of small, inexpensive, low-power, distributed devices, which are capable of local processing and wireless communication, a reality. Such nodes are called as sensor nodes. Each sensor node is capable of only a limited amount of processing. But when coordinated with the information from a large number of other nodes, they have the ability to measure a given physical environment in great detail. Thus, a sensor network can be described as a collection of sensor nodes which co-ordinate to perform some specific action. Unlike traditional networks, sensor networks depend on dense deployment and co-ordination to carry out their tasks.
A wireless sensor network consists of hundreds or thousands of low cost nodes which could either have a fixed location or randomly deployed to monitor the environment. Due to their small size, they have a number of limitations. Sensors usually communicate with each other using a multi hop approach. The flowing of data ends at special nodes called base stations (sometimes they are also referred to as sinks). A base station links the sensor network to another network (like a gateway) to disseminate the data sensed for further processing. Base stations have enhanced capabilities over simple sensor nodes since they must do complex data processing; this justifies the fact that bases stations have workstation/laptop class processors, and of course enough memory, energy, storage and computational power to perform their tasks well. Usually, the communication between base stations is initiated over high bandwidth links.
SENSOR NETWORKS VS AD-HOC NETWORKS.
The number of sensor nodes in a sensor network is larger than that of most ad hoc networks. As a result, scalable distributed algorithms must be developed for sensor networks.
• Sensor nodes may not have global identification. Sensor queries in sensor networks are often data-centric, rather than node-centric. Queries are not directed towards a specific node. Any node that has the requested data is equally valid.
• Sensor nodes have limited power supply, and recharge of power is often impractical (considering only the large amount of nodes). Energy efficiency is crucial in sustaining sensor network functionalities and extending system lifetime. Experiments show that wireless communication (rather than computation) contributes a major part to energy consumption. Therefore, reducing communication is the key to energy conservation.
• Sensor nodes are densely deployed, and data is being extracted from the environment. Thus, the data from neighboring nodes is highly redundant. Based on this observation, in network processing and data aggregation (or compression) are topics of high interest because they serve both purposes of relieving network traffic and conserving energy.
• Sensor nodes are prone to failures. Sensor nodes may fail due to lack of power, physical damage, or radio interference. Therefore, robustness (or fault tolerance) is an important design issue in sensor networks.
SECURITY
Wireless Sensor Network may be deployed in hostile environments with sensors operating unsupervised. Hence, an adversary can interrupt the functionality of location-aware applications by exploiting the vulnerabilities of the localization scheme. Obtaining accurate positions of nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. Location-dependent services are deployed; they will increasingly become tempting targets for malicious attacks. Unlike traditional systems, the localization infrastructure is sensitive to non-cryptographic attacks, and these cannot be addressed using traditional security services.
LOCALIZATION
Localization is the process by which sensor nodes determine their location. In simple terms, localization is a mechanism for discovering spatial relationships between objects. The various approaches taken in literature to solve this localization problem differ in the assumptions they make about their respective network and sensor capabilities. A detailed, but not exhaustive, list of assumptions made include assumptions about device hardware, signal propagation models, timing and energy requirements, and composition of network viz homogeneous vs. heterogeneous, operational environment viz indoor vs. outdoor, beacon density, time synchronization, communication costs, error requirements, and node mobility.
SECURE LOCALIZATION SCHEME
The main problem is enabling nodes of a wireless sensor network to determine their location even in the presence of malicious adversaries. This problem will be referred to as Secure Localization. Secure localization is a different problem from verifying the location claim of a sensor, known as location verification.Secure localization design goals are a) decentralized implementation, (b) resource efficiency, and © robustness against security threats.
Secure Range-independent Localization scheme enables sensors to determine their location based on beacon information transmitted by the locators, and present the security mechanisms that protect the location computation, in the presence of malicious adversaries. It is a range-free, distributed, resource-efficient localization technique in which there is no communication requirement between nodes for location discovery. This algorithm is robust against wormhole attacks, sybil attacks and sensor compromise. This algorithm considers two sets of nodes: N, which is the set of sensor nodes equipped with omni directional antennas, and L, which is the set of locator nodes equipped with directional antennas. The sensors determine their location based on the location information transmitted by these locators. Each locator transmits different beacons at each antenna sector with each beacon containing two pieces of information: the locator coordinates and the angles of the antenna boundary lines with respect to a common global axis.
Reply
#2

to get information about the topic securing wireless communication full report ,ppt and related topic please refer page link bellow

http://studentbank.in/report-test-platfo...using-xtea

http://studentbank.in/report-wireless-co...ts-for-ece

http://studentbank.in/report-secure-wire...munication

http://studentbank.in/report-wireless-co...ion--14279

http://studentbank.in/report-secured-wir...munication

http://studentbank.in/report-wireless-co...g-students

http://studentbank.in/report-assisgnment...n-networks

http://studentbank.in/report-pc-based-ro...modulation

http://studentbank.in/report-wireless-op...ull-report

http://studentbank.in/report-wireless-co...279?page=2

http://studentbank.in/report-a-hi-fi-aud...packet-tra

http://studentbank.in/report-secure-wire...calization
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: secure voice, secure powerpoint presentation, seminar report on the topic secure shell, secure routing in wireless sensor networks report, seminar report on secure hash algorithm, previous question paper ec2051 wsn, secure file trasfer,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ROBUST DWT-SVD DOMAIN IMAGE WATERMARKING: EMBEDDING DATA IN ALL FREQUENCIES computer science crazy 2 5,223 19-06-2018, 06:10 PM
Last Post: KavyaIyengar
  Military combat robot wireless controlled. Camera helps keeping an eye on border. seminar class 6 11,392 09-06-2017, 10:27 AM
Last Post: jaseela123d
  AUTOMATIC STREET LIGHT CONTROL WITH SENSOR TECHNOLOGY seminar class 2 11,750 22-05-2017, 11:07 AM
Last Post: yasminoth93
  DESIGN AND IMPLEMENTATION OF GOLAY ENCODER AND DECODER computer science crazy 2 23,627 26-08-2016, 03:46 PM
Last Post: anasek
  WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS seminar class 7 19,071 17-08-2016, 09:23 AM
Last Post: jaseela123d
  Wireless Communication – ZigBee / Bluetooth / RF / IR based major projects for ECE project topics 9 19,307 16-07-2016, 03:45 PM
Last Post: jaseela123d
  Wireless based Automatic dam water level control shutter open /closed with emergency smart paper boy 4 11,458 11-09-2015, 02:00 PM
Last Post: seminar report asees
  Multiuser SMS Based Wireless Electronic Notice Board seminar class 4 5,816 20-05-2015, 01:33 PM
Last Post: seminar report asees
  Measuring the Performance of IEEE 802.11p Using ns-2 Simulator for Vehicular Networks smart paper boy 3 2,574 07-10-2014, 06:34 PM
Last Post: seminar report asees
  wireless charging of mobile phones using microwaves ramki86 33 21,580 05-08-2014, 09:29 PM
Last Post: seminar report asees

Forum Jump: