Secure Data Collection in Wireless Sensor Networks full report
#1

Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes



.pdf   T-secure data collection in wireless sensor network tranction.pdf (Size: 1.84 MB / Downloads: 6)

INTRODUCTION
Motivations


OF the various possible security threats encountered in a
wireless sensor network (WSN), in this paper, we are
specifically interested in combating two types of attacks:
compromised node (CN) and denial of service (DOS) [22].
In the CN attack, an adversary physically compromises a
subset of nodes to eavesdrop information, whereas in the
DOS attack, the adversary interferes with the normal
operation of the network by actively disrupting, changing,
or even paralyzing the functionality of a subset of nodes.
These two attacks are similar in the sense that they both
generate black holes: areas within which the adversary can
either passively intercept or actively block information
delivery. Due to the unattended nature of WSNs, adversaries
can easily produce such black holes [1]. Severe CN
and DOS attacks can disrupt normal data delivery between
sensor nodes and the sink, or even partition the topology.


Contributions and Organization

The key contributions of this work are as follows:
1. We explore the potential of random dispersion for
information delivery in WSNs. Depending on the
type of information available to a sensor, we develop
four distributed schemes for propagating information
“shares”: purely random propagation (PRP),
directed random propagation (DRP), nonrepetitive
random propagation (NRRP), and multicast treeassisted
random propagation (MTRP). PRP utilizes
only one-hop neighborhood information and provides
baseline performance. DRP utilizes two-hop
neighborhood information to improve the propagation
efficiency, leading to a smaller packet interception
probability.


RANDOMIZED MULTIPATH DELIVERY
Overview


As illustrated in we consider a three-phase approach
for secure information delivery in a WSN: secret sharing of
information, randomized propagation of each information
share, and normal routing (e.g., min-hop routing) toward
the sink. More specifically, when a sensor node wants to
send a packet to the sink, it first breaks the packet into
M shares, according to a ðT;MÞ-threshold secret sharing
algorithm, e.g., Shamir’s algorithm [20]. Each share is then
transmitted to some randomly selected neighbor.


Random Propagation of Information Shares

To diversify routes, an ideal random propagation algorithm
would propagate shares as dispersively as possible.
Typically, this means propagating the shares farther from
their source. At the same time, it is highly desirable to have
an energy-efficient propagation, which calls for limiting the
number of randomly propagated hops. The challenge here
lies in the random and distributed nature of the propagation:
a share may be sent one hop farther from its source in a
given step, but may be sent back closer to the source in the
next step, wasting both steps from a security standpoint. To
tackle this issue, some control needs to be imposed on the
random propagation process.


ASYMPTOTIC ANALYSIS OF THE PRP SCHEME
The random routes generated by the four algorithms in
Section 2 are not necessarily node-disjoint. So, a natural
question ishow good these routes are in avoiding black holes.
We answer this question by conducting asymptotic analysis
of the PRP scheme. Theoretically, such analysis can be
interpreted as an approximation of the performancewhenthe
node density is sufficiently large. It also serves as a lower
bound on the performance of the NRRP, DRP, and MTRP
schemes. Note that the security analysis for the CN and DOS
attacks are similar because both of them involve calculating
the packet interception probability. For brevity,weonly focus
on theCNattack model. The same treatment can be applied to
the DOS attack with a straightforward modification.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: secure data collection in wireless sensor networks using randomized dispersive routes project uml diagrams, ppt on secure data collection on wireless sensor network using random routing algorithm, secure data collection in wireless sensor network, full project report on secure data collection in wireless sensor, data collection in wireless sensor networks using rendoimized despersive routes, secure data aggregation in wireless sensor networks projects, secure data collection in wireless sensor networks using randomized dispersive routes ppt free download,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ATM WITH AN EYE FULL REPORT seminar details 1 5,767 09-07-2016, 12:36 PM
Last Post: seminar report asees
  Authentication Schemes for Session Passwords using Color and Images full report seminar details 1 2,827 29-07-2015, 02:27 PM
Last Post: Guest
  AUTOMATIC PHASE CHANGER full report seminar paper 3 3,542 27-03-2015, 10:06 AM
Last Post: seminar report asees
  Wireless LAN Security FULL REPORT seminar details 3 5,126 06-11-2014, 09:23 PM
Last Post: seminar report asees
  BRAIN FINGERPRINTING full report project uploader 2 10,781 24-10-2014, 11:49 PM
Last Post: jaseela123d
  Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networksy seminar addict 1 1,496 25-08-2014, 05:40 PM
Last Post: Guest
  TERRORISM full report project uploader 2 2,276 08-05-2013, 10:17 AM
Last Post: computer topic
  MEMRISTOR FULL REPORT seminar details 1 3,441 25-01-2013, 12:02 PM
Last Post: seminar details
  Windows 8 FULL REPORT seminar paper 3 4,476 24-01-2013, 12:34 PM
Last Post: seminar details
  FIREWIRE full report seminar details 1 2,444 11-01-2013, 10:18 AM
Last Post: seminar details

Forum Jump: