The document discusses secure routing protocols for wireless sensor networks. It begins by describing the components and design challenges of wireless sensor networks, including limited resources and security issues. It then discusses various attacks on wireless sensor networks like spoofing, selective forwarding, and sinkhole attacks. The document analyzes several secure routing protocols that aim to prevent such attacks, including Distributed Security Framework, Multipath Data Transfer Protocol, Secure and Energy Efficient Disjoint Route, and Bio-inspired Self-Organized Secure Autonomous Routing Protocol. It concludes by discussing future work to develop a new routing approach with low energy consumption, high delivery ratio, and strong security against possible threats.
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
This document proposes algorithms to detect wormhole attacks in wireless network coding systems. It first discusses how wormhole attacks can severely impact network coding protocols by disrupting routing and introducing unfair workload distributions. It then presents a centralized algorithm that uses a central node to detect wormholes by measuring changes in expected transmission counts. For distributed systems without a central node, it proposes DAWN, a distributed algorithm that examines the order nodes receive innovative packets and their expected transmission counts to detect wormholes. The algorithms aim to detect wormholes using only local information available from regular network coding protocols to keep overhead low. Extensive testing validated the effectiveness and efficiency of the proposed approaches.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
We would send hard copy of Journal by speed post to the address of correspondence author after online publication of paper.
We will dispatched hard copy to the author within 7 days of date of publication
This document summarizes a student's paper on using reinforcement learning for anomaly detection in software defined networks. The student aims to use machine learning techniques, specifically reinforcement learning, to make network traffic control decisions given certain network attack scenarios. The student's methodology involves using network statistics collected from an OpenFlow switch to define states for a reinforcement learning algorithm. The algorithm is deployed on the application plane of an SDN architecture and aims to identify anomalous traffic flows based on features like flow size and packet counts, then take actions through the controller to stop anomalous traffic from affecting the network. Initial testing of the approach showed potential for detecting ping flood and SYN flood attacks on the simulated network.
This document discusses security challenges in wireless sensor networks. It covers several topics: why security is needed in WSNs given their mission-critical applications; why security is more complicated in WSNs due to resource constraints of sensor nodes; common security requirements like confidentiality, integrity, and availability; guiding principles for securing WSNs like decentralized management and adaptive security; common attacks against WSNs at different layers of the protocol stack; and open research issues regarding cryptography, key management, secure data aggregation, and other high-level security mechanisms for WSNs.
The document discusses defense mechanisms against flooding attacks in mobile ad hoc networks (MANETs). It begins with broad background on networks and network security. It then discusses specific areas including MANETs and flooding attacks. The document reviews several papers from 2008-2011 on related topics. It discusses methodologies, advantages and drawbacks of approaches for detecting and preventing flooding attacks in MANETs, including using period-based mechanisms, trust-based classification of nodes, and probabilistic broadcasting. The comparative study section provides brief summaries of several papers analyzing defenses against flooding attacks in MANETs.
This document summarizes key aspects of wireless sensor networks (WSNs) including common threats, operational paradigms, and key distribution techniques. It discusses the main operational paradigms of WSNs: simple collection and transmittal, forwarding, receive and process commands, self-organization, and data aggregation. For each, it outlines vulnerabilities and potential solutions. It also summarizes three common key distribution schemes: using a single network-wide key, asymmetric cryptography, and pairwise keys. For each it discusses properties and drawbacks regarding resilience, scalability, and memory requirements.
Wireless sensor networks require a high level of security even though their resources are limited. They face many types of attacks due to their broadcast transmissions and deployment in hostile environments without physical protection. Attacks can target the information in transit, different layers of the protocol stack, and seek to overwhelm the network. While some challenges have been addressed, research is still needed to resolve conflicts between security and limited resources in wireless sensor networks.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. Mail to: [email protected]
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
This document provides an overview of sensor network security. It begins with objectives to learn about ad hoc and sensor network security aspects, attacks, and transport layer security issues. It then covers topics like security requirements, challenges in provisioning security, network security attacks categorized by layer (physical, data link, network, transport, application), and possible solutions for jamming, tampering, black hole attacks, and flooding attacks. The document also discusses key distribution, management techniques and procedures, and secure routing protocols like SPINS.
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
Webinar Contents:
Why use a Network Simulator
Introduction to NetSim
Introduction to Sinkhole Attack : Attack scenario in MANET using NetSim
Intrusion Detection System: Detection mechanism in MANET using NetSim
Analyzing Metrics
Areas of R & D in MANET
Q & A
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
International Journal of Computational Engineering Research(IJCER)ijceronline
1. The document discusses selective jamming attacks in wireless networks. Selective jamming attacks target important messages to degrade network performance.
2. The authors develop three schemes that combine cryptographic techniques with physical layer attributes to prevent real-time packet classification and mitigate selective jamming attacks.
3. The schemes are analyzed for their security and computational and communication overhead. The schemes aim to prevent adversaries from identifying important messages to selectively jam on the physical layer.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
This document presents a distributed algorithm called DAWN to detect wormhole attacks in wireless network coding systems. The algorithm has two phases: 1) a detection phase where each node uses the expected transmission count (ETX) metric to detect if any attackers exist, and 2) a reporting phase where detected attackers are reported to other nodes. ETX represents the number of transmissions needed for a packet to be received and can reveal the network topology. DAWN examines the order nodes receive packets and their ETX values to identify attackers. It signatures reports to prevent manipulation and distributes the workload of detection across all nodes. The algorithm successfully detects wormhole attacks with high rates while imposing low computation and communication overhead.
This document provides an overview of mobile ad hoc networks (MANets) and security attacks against them. It discusses the following key points:
1. MANets are self-configuring, dynamic wireless networks without centralized administration or fixed infrastructure that allow nodes to connect to each other.
2. Security in MANets is challenging due to the lack of infrastructure and centralized monitoring. Common attacks target the physical, data link, network, transport, and multi-layers of the network.
3. Attacks discussed include flooding, blackhole, link spoofing, wormhole, denial of service, and traffic monitoring aimed at different layers of the network. Countermeasures are needed to strengthen MANet security.
Wireless sensor networks (WSN) are networks of distributed autonomous sensors that monitor environmental or physical conditions. A WSN consists of sensor nodes that collect data and transmit it wirelessly to gateways or base stations. Key components of sensor nodes include processors, transceivers, memory, power sources, and sensors. The design of WSNs aims to minimize node size, power consumption, and maximize diversity, robustness, security, connectivity, and scalability. Common routing protocols for WSNs include flat, hierarchical, location-based, and QoS-based protocols. Security challenges in WSNs include physical tampering, jamming, spoofing, and Sybil attacks. Defenses utilize techniques like encryption, authentication,
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
This document discusses security issues and attacks in mobile ad hoc networks (MANETs). It provides an introduction to MANETs and their characteristics. It outlines the general objectives of analyzing flooding attacks on MANETs and preventing such attacks for networks with high node mobility. It describes common attacks on MANETs such as flooding attacks, blackhole attacks, wormhole attacks, and Byzantine attacks. The document also discusses security mechanisms for MANETs including preventive cryptography-based approaches and reactive intrusion detection system approaches. It stresses the need for comprehensive security solutions to deal with the diverse attacks that are facilitated by the open and dynamic nature of MANETs.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
While wireless sensor networks face security challenges, addressing issues like confidentiality, integrity, and availability is critical for successful deployment. The document discusses these security requirements and explains how attacks can target different network layers. It provides examples of physical layer attacks like jamming and tampering. At higher layers, attacks include collisions and resource exhaustion in the data link layer, and spoofing, selective forwarding, sinkholes, Sybil attacks and wormholes in the network layer. Transport layer attacks involve flooding and desynchronization. Confidentiality, integrity, and cryptography are also discussed as important security concepts for wireless sensor networks.
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...IJNSA Journal
This document summarizes research on developing a distributed intrusion detection system for mobile ad hoc networks (MANETs) using dynamic neural networks. The system uses learning vector quantization neural networks distributed across nodes to identify patterns of network attacks. In a simulation of 18 nodes, the system successfully detected 80% of man-in-the-middle attacks on the ad hoc on-demand distance vector routing protocol. The distributed nature of the neural network approach helps overcome limitations of bandwidth and connectivity in MANETs compared to traditional centralized intrusion detection systems.
The document discusses security mechanisms for spontaneous networks. It begins with an overview of the growth of mobile communications and challenges in configuring services and providing security in spontaneous networks that imitate human relationships. Key management schemes are needed for node authorization and user authentication in mobile ad hoc networks. Existing methods require initial configuration or external authorities. The proposed system aims to reduce dependence on a central authority for re-authentication to avoid possible attacks, increase performance by reducing server utilization, and implement a workload mechanism for efficient server usage.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. Mail to: [email protected]
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
This document provides an overview of sensor network security. It begins with objectives to learn about ad hoc and sensor network security aspects, attacks, and transport layer security issues. It then covers topics like security requirements, challenges in provisioning security, network security attacks categorized by layer (physical, data link, network, transport, application), and possible solutions for jamming, tampering, black hole attacks, and flooding attacks. The document also discusses key distribution, management techniques and procedures, and secure routing protocols like SPINS.
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
Webinar Contents:
Why use a Network Simulator
Introduction to NetSim
Introduction to Sinkhole Attack : Attack scenario in MANET using NetSim
Intrusion Detection System: Detection mechanism in MANET using NetSim
Analyzing Metrics
Areas of R & D in MANET
Q & A
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
International Journal of Computational Engineering Research(IJCER)ijceronline
1. The document discusses selective jamming attacks in wireless networks. Selective jamming attacks target important messages to degrade network performance.
2. The authors develop three schemes that combine cryptographic techniques with physical layer attributes to prevent real-time packet classification and mitigate selective jamming attacks.
3. The schemes are analyzed for their security and computational and communication overhead. The schemes aim to prevent adversaries from identifying important messages to selectively jam on the physical layer.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
This document presents a distributed algorithm called DAWN to detect wormhole attacks in wireless network coding systems. The algorithm has two phases: 1) a detection phase where each node uses the expected transmission count (ETX) metric to detect if any attackers exist, and 2) a reporting phase where detected attackers are reported to other nodes. ETX represents the number of transmissions needed for a packet to be received and can reveal the network topology. DAWN examines the order nodes receive packets and their ETX values to identify attackers. It signatures reports to prevent manipulation and distributes the workload of detection across all nodes. The algorithm successfully detects wormhole attacks with high rates while imposing low computation and communication overhead.
This document provides an overview of mobile ad hoc networks (MANets) and security attacks against them. It discusses the following key points:
1. MANets are self-configuring, dynamic wireless networks without centralized administration or fixed infrastructure that allow nodes to connect to each other.
2. Security in MANets is challenging due to the lack of infrastructure and centralized monitoring. Common attacks target the physical, data link, network, transport, and multi-layers of the network.
3. Attacks discussed include flooding, blackhole, link spoofing, wormhole, denial of service, and traffic monitoring aimed at different layers of the network. Countermeasures are needed to strengthen MANet security.
Wireless sensor networks (WSN) are networks of distributed autonomous sensors that monitor environmental or physical conditions. A WSN consists of sensor nodes that collect data and transmit it wirelessly to gateways or base stations. Key components of sensor nodes include processors, transceivers, memory, power sources, and sensors. The design of WSNs aims to minimize node size, power consumption, and maximize diversity, robustness, security, connectivity, and scalability. Common routing protocols for WSNs include flat, hierarchical, location-based, and QoS-based protocols. Security challenges in WSNs include physical tampering, jamming, spoofing, and Sybil attacks. Defenses utilize techniques like encryption, authentication,
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
This document discusses security issues and attacks in mobile ad hoc networks (MANETs). It provides an introduction to MANETs and their characteristics. It outlines the general objectives of analyzing flooding attacks on MANETs and preventing such attacks for networks with high node mobility. It describes common attacks on MANETs such as flooding attacks, blackhole attacks, wormhole attacks, and Byzantine attacks. The document also discusses security mechanisms for MANETs including preventive cryptography-based approaches and reactive intrusion detection system approaches. It stresses the need for comprehensive security solutions to deal with the diverse attacks that are facilitated by the open and dynamic nature of MANETs.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
While wireless sensor networks face security challenges, addressing issues like confidentiality, integrity, and availability is critical for successful deployment. The document discusses these security requirements and explains how attacks can target different network layers. It provides examples of physical layer attacks like jamming and tampering. At higher layers, attacks include collisions and resource exhaustion in the data link layer, and spoofing, selective forwarding, sinkholes, Sybil attacks and wormholes in the network layer. Transport layer attacks involve flooding and desynchronization. Confidentiality, integrity, and cryptography are also discussed as important security concepts for wireless sensor networks.
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...IJNSA Journal
This document summarizes research on developing a distributed intrusion detection system for mobile ad hoc networks (MANETs) using dynamic neural networks. The system uses learning vector quantization neural networks distributed across nodes to identify patterns of network attacks. In a simulation of 18 nodes, the system successfully detected 80% of man-in-the-middle attacks on the ad hoc on-demand distance vector routing protocol. The distributed nature of the neural network approach helps overcome limitations of bandwidth and connectivity in MANETs compared to traditional centralized intrusion detection systems.
The document discusses security mechanisms for spontaneous networks. It begins with an overview of the growth of mobile communications and challenges in configuring services and providing security in spontaneous networks that imitate human relationships. Key management schemes are needed for node authorization and user authentication in mobile ad hoc networks. Existing methods require initial configuration or external authorities. The proposed system aims to reduce dependence on a central authority for re-authentication to avoid possible attacks, increase performance by reducing server utilization, and implement a workload mechanism for efficient server usage.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Characterization of directed diffusion protocol in wireless sensor networkijwmn
Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments
of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes
are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN,
there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric
protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD
protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across
the globe. These upgraded versions of DD protocols add on various features to the original DD protocol
such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss
and classify various characteristics of themost populardirected diffusion protocols that have been proposed
over couple of years.
Iaetsd secure data dissemination based onIaetsd Iaetsd
This document proposes a secure data dissemination protocol called Se-Drip for wireless sensor networks. Se-Drip uses a Merkle hash tree to securely disseminate data from a base station to sensor nodes in the network. The protocol has three phases: 1) initialization where the base station generates keys and loads them on nodes, 2) packet preprocessing where the base station constructs data packets and their authentication paths in a Merkle hash tree, and 3) packet verification where nodes verify received packets against the hash tree to authenticate the data. Se-Drip aims to securely disseminate data while being lightweight, robust to packet loss, and resistant to denial-of-service attacks.
Requisite Trust Based Routing Protocol for WSNAM Publications
This document summarizes a research paper on using a trust-based routing protocol (RTSR) for wireless sensor networks (WSNs). The summary is:
1) The RTSR protocol uses a cluster-based approach and calculates trust values between nodes to securely discover routes while reducing message and route redundancy.
2) Trust values from neighboring nodes are used to calculate a single trust value for each node. Route discovery and trust information is stored at fixed cluster heads.
3) The protocol aims to improve on previous approaches that did not consider security during route discovery. It analyzes performance metrics like energy consumption, number of hops, and delay compared to the LEEACH routing algorithm for WSNs.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
Wireless sensor networks are used to monitor environmental conditions like temperature and humidity under controlled environments for seed germination experiments. A wireless remote monitoring system using sensors can precisely monitor temperature, humidity, and water content of seeds in closed containers. ZigBee wireless sensor networks are effective for real-time monitoring of the conditions necessary for seed germination and growth. Researchers aim to design a wireless sensor network integrated with sensors to remotely manage and monitor the environmental parameters for seed germination experiments under controlled conditions.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
- Wireless sensor networks (WSNs) are composed of small, battery-powered sensor nodes that collect data from the environment and transmit it to each other and a base station. They face challenges related to node mobility, energy efficiency, and lifetime.
- The document discusses clustering in WSNs, which involves organizing nodes into clusters with cluster heads to improve stability and reduce energy consumption. It also covers security issues and applications of WSNs in various fields like healthcare, the environment, and more.
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
This document describes a project report submitted for the degree of Bachelor of Technology in Information Technology. The report focuses on network intrusion detection and node recovery using dynamic path routing. It was submitted by three students - Nishanth G., Sudharshan N., and Surya Krishnan R. - to Sri Venkateswara College of Engineering in partial fulfillment of their degree requirements. The document includes sections on acknowledgements, abstract, contents, introduction, literature survey, system design, network topology, network intrusion detection and prevention, node recovery, source anonymity, dynamic path routing, results and discussions, and conclusions. It aims to address privacy and security issues in networks through techniques like encryption, evidence collection, risk assessment
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
This document proposes a secure authentication approach for wireless sensor networks using dynamic key management and zero knowledge protocols. It begins with background on wireless sensor networks and security issues. It then describes related work on key predistribution and dynamic key management schemes. A proposed algorithm is described that uses a rekeying mechanism, zero knowledge authentication without directly transmitting secret keys, and dynamic keys that change for each authentication. Simulation results on networks of up to 25 nodes show the approach is efficient and can authenticate nodes while preventing attacks like cloning.
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Value Stream Mapping Worskshops for Intelligent Continuous SecurityMarc Hornbeek
This presentation provides detailed guidance and tools for conducting Current State and Future State Value Stream Mapping workshops for Intelligent Continuous Security.
Sorting Order and Stability in Sorting.
Concept of Internal and External Sorting.
Bubble Sort,
Insertion Sort,
Selection Sort,
Quick Sort and
Merge Sort,
Radix Sort, and
Shell Sort,
External Sorting, Time complexity analysis of Sorting Algorithms.
☁️ GDG Cloud Munich: Build With AI Workshop - Introduction to Vertex AI! ☁️
Join us for an exciting #BuildWithAi workshop on the 28th of April, 2025 at the Google Office in Munich!
Dive into the world of AI with our "Introduction to Vertex AI" session, presented by Google Cloud expert Randy Gupta.
its all about Artificial Intelligence(Ai) and Machine Learning and not on advanced level you can study before the exam or can check for some information on Ai for project
Fluid mechanics is the branch of physics concerned with the mechanics of fluids (liquids, gases, and plasmas) and the forces on them. Originally applied to water (hydromechanics), it found applications in a wide range of disciplines, including mechanical, aerospace, civil, chemical, and biomedical engineering, as well as geophysics, oceanography, meteorology, astrophysics, and biology.
It can be divided into fluid statics, the study of various fluids at rest, and fluid dynamics.
Fluid statics, also known as hydrostatics, is the study of fluids at rest, specifically when there's no relative motion between fluid particles. It focuses on the conditions under which fluids are in stable equilibrium and doesn't involve fluid motion.
Fluid kinematics is the branch of fluid mechanics that focuses on describing and analyzing the motion of fluids, such as liquids and gases, without considering the forces that cause the motion. It deals with the geometrical and temporal aspects of fluid flow, including velocity and acceleration. Fluid dynamics, on the other hand, considers the forces acting on the fluid.
Fluid dynamics is the study of the effect of forces on fluid motion. It is a branch of continuum mechanics, a subject which models matter without using the information that it is made out of atoms; that is, it models matter from a macroscopic viewpoint rather than from microscopic.
Fluid mechanics, especially fluid dynamics, is an active field of research, typically mathematically complex. Many problems are partly or wholly unsolved and are best addressed by numerical methods, typically using computers. A modern discipline, called computational fluid dynamics (CFD), is devoted to this approach. Particle image velocimetry, an experimental method for visualizing and analyzing fluid flow, also takes advantage of the highly visual nature of fluid flow.
Fundamentally, every fluid mechanical system is assumed to obey the basic laws :
Conservation of mass
Conservation of energy
Conservation of momentum
The continuum assumption
For example, the assumption that mass is conserved means that for any fixed control volume (for example, a spherical volume)—enclosed by a control surface—the rate of change of the mass contained in that volume is equal to the rate at which mass is passing through the surface from outside to inside, minus the rate at which mass is passing from inside to outside. This can be expressed as an equation in integral form over the control volume.
The continuum assumption is an idealization of continuum mechanics under which fluids can be treated as continuous, even though, on a microscopic scale, they are composed of molecules. Under the continuum assumption, macroscopic (observed/measurable) properties such as density, pressure, temperature, and bulk velocity are taken to be well-defined at "infinitesimal" volume elements—small in comparison to the characteristic length scale of the system, but large in comparison to molecular length scale
Data Structures_Linear data structures Linked Lists.pptxRushaliDeshmukh2
Concept of Linear Data Structures, Array as an ADT, Merging of two arrays, Storage
Representation, Linear list – singly linked list implementation, insertion, deletion and searching operations on linear list, circularly linked lists- Operations for Circularly linked lists, doubly linked
list implementation, insertion, deletion and searching operations, applications of linked lists.
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYijscai
With the increased use of Artificial Intelligence (AI) in malware analysis there is also an increased need to
understand the decisions models make when identifying malicious artifacts. Explainable AI (XAI) becomes
the answer to interpreting the decision-making process that AI malware analysis models use to determine
malicious benign samples to gain trust that in a production environment, the system is able to catch
malware. With any cyber innovation brings a new set of challenges and literature soon came out about XAI
as a new attack vector. Adversarial XAI (AdvXAI) is a relatively new concept but with AI applications in
many sectors, it is crucial to quickly respond to the attack surface that it creates. This paper seeks to
conceptualize a theoretical framework focused on addressing AdvXAI in malware analysis in an effort to
balance explainability with security. Following this framework, designing a machine with an AI malware
detection and analysis model will ensure that it can effectively analyze malware, explain how it came to its
decision, and be built securely to avoid adversarial attacks and manipulations. The framework focuses on
choosing malware datasets to train the model, choosing the AI model, choosing an XAI technique,
implementing AdvXAI defensive measures, and continually evaluating the model. This framework will
significantly contribute to automated malware detection and XAI efforts allowing for secure systems that
are resilient to adversarial attacks.
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxRishavKumar530754
LiDAR-Based System for Autonomous Cars
Autonomous Driving with LiDAR Tech
LiDAR Integration in Self-Driving Cars
Self-Driving Vehicles Using LiDAR
LiDAR Mapping for Driverless Cars
The Fluke 925 is a vane anemometer, a handheld device designed to measure wind speed, air flow (volume), and temperature. It features a separate sensor and display unit, allowing greater flexibility and ease of use in tight or hard-to-reach spaces. The Fluke 925 is particularly suitable for HVAC (heating, ventilation, and air conditioning) maintenance in both residential and commercial buildings, offering a durable and cost-effective solution for routine airflow diagnostics.
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELESS SENSOR NETWORKS
1. 1. INTRODUCTION
1.1 MOTIVATION
The main motivation of the project is to improvise the security parameters for a
wireless sensor networks and to regularize the multi-hop routing techniques. The
proposed work is developed using a fuzzy based trust model which simultaneously
consider multiple constrains and provides better security and energy conservation.
Wireless sensor network exhibits various characteristics such as tree structured
routing, computation and phased transmission periods, data aggregation mechanisms,
in-network filtering methods and acceptable failures. Due to mobility in wireless
sensor networks ,the harm of various malicious attacks based on the technique of
replaying routing information is further exaggerated and the network behavior
becomes aggressive. Although mobility concept is for efficient data collection, it
generally increases the chance of communication between the actual sensor nodes and
the attackers.
The applications for WSNs are many and varied. They are used in commercial and
industrial applications to monitor data that would be difficult or expensive to monitor
using wired sensors. They could be deployed in wilderness areas, where they would
remain for many years (monitoring some environmental variable) without the need to
recharge/replace their power supplies. They could form a perimeter about a property
and monitor the progression of intruders (passing information from one node to the
next).
A typical wireless sensor network consists of a base station and several nodes
distributed or positioned in the environment of interest. Each node is expected to
detect events of interest and estimate parameters that characterize these events. The
resulting information at a node needs to be transmitted to the base station either
directly or in “multi-hop” fashion involving automatic routing through several other
nodes in the network. Implementation of such a network requires hardware
components and corresponding software modules to program these components in a
cooperative manner.
1
2. 1.2 PROBLEM DEFINITION
Wireless sensor networks involve multi-hop routing and it offer minor security
against identity deception through replaying routing information. Secure data
aggregation is an important criterion that attracts serious research work. The factors
responsible in such harsh wireless sensor networks are increased complexity, high
overhead and poor link quality in case of various cryptographic techniques.
1.3 OBJECTIVE OF PROJECT
The objective of this project was to develop a java program which provides
energy-efficient routing and reliable trust using a fuzzification methods and to
provide better security and energy conservation.
To achieve this target, we have proposed an appropriate framework
mechanisms. FBTARF(fuzzy based Trust aware routing framework) provides the
effective solution against harmful attacks due to identity deception and it is the
proposed method for security improvisation in dynamic wireless sensor networks.
Using a fuzzy logic routing over a network is done and energy cost and trust
values of sensor nodes are calculated. a packet is transferred from source to the sink
node .
1.4 LIMITATIONS OF THE PROJECT
• This project is limited only in finding the values Energy cost, Trust level and
power level of each node but not the performance capacity of each node.
• Transferring of files in text format is only supported but images cannot be
transmitted.
1.5 ORGANIZATION OF DOCUMENTATION
In this documentation, we have initially highlighted the definition and
objectives of the project as well as the design of the project which is followed by
implementation, testing, conclusion and Future Enhancements.
2
3. 2. LITERATURE SURVEY
Literature survey is the most important step in software development process.
Before developing the tool it is necessary to determine the time factor, economy and
company strength. Once these things are satisfied, next step is to determine which
operating system and language can be used for developing the tool. Once the
programmers start building the tool, the programmers need lot of external support.
This support can be obtained from senior programmers, from book or from web sites.
Before building the system the above considerations are taken into an account for
developing the proposed system.
2.1 INTRODUCTION
Wireless sensor networks (WSN) are the domain mostly engaged in military
surveillance and detection of forest fire. Battery-powered senor nodes are
interconnected with tremendously limited processing capabilities in WSN. A sensor
node or device connected in a WSN environment sends information to the destination
through the multi-hop routing path within the coverage area of allotted radio
communication range. This multi-hop routing often becomes victim for the suspicious
malicious attacks. An attacker may intrude the nodes physically, collide with the
sensor nodes during transmission, drop the data messages or misdirect messages in
the intermediate route path or block the communication channel by jamming the radio
interference. Due to identity inception, the attacker can launch various unidentifiable
attacks and malicious intrusions which are hard to detect during the normal course of
transmission. This research paper deals with various kinds of attacks where in the
intruders mislead the network traffic and messages by identity deception through
routing information change. In terms of security, WSN is one domain which is more
vulnerable to various attacks. In order to achieve better security, several works have
been proposed in the related area but the integration parameters for various attack
detection and control are still in the initial stages.
WSN exhibits various characteristics such as tree structured routing, computation and
phased transmission periods, data aggregation mechanisms, in-network filtering
methods and acceptable failures. Due to the mobility in wireless sensor networks, the
harm of various malicious attacks based on the technique of replaying routing
information is further exaggerated and the network behavior becomes aggressive.
3
4. Although mobility concept is for efficient data collection, it greatly increases the
chance of communication between the actual sensor nodes and the attackers as shown
in various applications. Minimizing energy conservation and the medium access layer
arguments are the main criteria to be considered for data aggregation using distributed
processing. For effective Routing analysis, data aggregation is the vital parameter. In
data aggregation, the following steps are to be followed. Merging all the information
from various sources, routing and removing the duplicate information, minimizing the
transmission number and conserving the energy are the salient features of data
aggregation. By means of data aggregation process, redundancy of data from other
sensor nodes can be prohibited. Data Extraction is also possible from the raw data.
Another important factor is sustaining high occurrence to preserve energy for a long
lifetime in the network.
Fig1:wireless sensor network
4
5. 2.2 EXISTING SYSTEM
In Existing system, when the file send from base station in that situation
hackers aggravated network conditions. A traditional cryptographic techniques effort
does not address the severe problems. That time the file could be affected by hackers.
So, the network will be damaged. An attacker may tamper nodes physically, create
traffic collision with seemingly valid transmission, drop or misdirect messages in
routes, or jam the communication channel by creating radio interference.
2.3 DISADVANTAGES
High transmission overhead
High data complexity
Complex encryption process
High bandwidth occupancy
Poor reliability
Poor data confidentiality
2.4 PROPOSED SYSTEM
To overcome these problems, secured fuzzy based trust aware routing framework
is implemented for the data aggregation process in WSN environment. To secure the
wireless sensor networks and to regularize the multi-hop routing techniques, the
present work h.as been designed and implemented.
2.5 ADVANTAGES OF PROPOSED SYSTEM
The advantages of proposed system are:
• It provides effective and efficient routing in the dynamic wireless sensor
network environment.
• It provides better security, energy conservation and packet delivery ratio.
• Secured data aggregation is achieved through this framework mechanism
5
6. 3 ANALYSIS
3.1 SOFTWARE REQUIREMENTS SPECIFICATION:
3.1.1 User Requirements:
Java Technology:
Java technology is both a programming language and a platform.
The Java Programming Language:
The Java programming language is a high-level language that can be
characterized by all of the following buzzwords:
Simple
Architecture neutral
Object oriented
Portable
Distributed
High performance
With most programming languages, you either compile or interpret a program
so that you can run it on your computer. The Java programming language is unusual
in that a program is both compiled and interpreted. With the compiler, first you
translate a program into an intermediate language called Java byte codes —the
platform-independent codes interpreted by the interpreter on the Java platform. The
interpreter parses and runs each Java byte code instruction on the computer.
Compilation happens just once; interpretation occurs each time the program is
executed. The following figure illustrates how this works.
6
7. Fig2: working of java
You can think of Java bytecodes as the machine code instructions for the Java
Virtual Machine (Java VM). Every Java interpreter, whether it’s a development tool
or a Web browser that can run applets, is an implementation of the Java VM. Java
bytecodes help make “write once, run anywhere” possible. You can compile your
program into bytecodes on any platform that has a Java compiler. The bytecodes can
then be run on any implementation of the Java VM. That means that as long as a
computer has a Java VM, the same program written in the Java programming
language can run on Windows 2000, a Solaris workstation, or on an iMac.
The Java Platform:
A platform is the hardware or software environment in which a program runs.
We’ve already mentioned some of the most popular platforms like Windows 2000,
Linux, Solaris, and MacOS. Most platforms can be described as a combination of the
operating system and hardware. The Java platform differs from most other platforms
in that it’s a software-only platform that runs on top of other hardware-based
platforms.
The Java platform has two components:
• The Java Virtual Machine (Java VM)
• The Java Application Programming Interface (Java API)
You’ve already been introduced to the Java VM. It’s the base for the Java
platform and is ported onto various hardware-based platforms.
The Java API is a large collection of ready-made software components that
provide many useful capabilities, such as graphical user interface (GUI) widgets. The
Java API is grouped into libraries of related classes and interfaces; these libraries are
7
8. known as packages. The next section, What Can Java Technology Do?, highlights
what functionality some of the packages in the Java API provide.
The following figure depicts a program that’s running on the Java platform. As the
figure shows, the Java API and the virtual machine insulate the program from the
hardware.
Fig3: The java platform
Native code is code that after you compile it, the compiled code runs on a
specific hardware platform. As a platform-independent environment, the Java
platform can be a bit slower than native code. However, smart compilers, well-tuned
interpreters, and just-in-time bytecode compilers can bring performance close to that
of native code without threatening portability.
Java provides more packages to develop all kind of applications and applets.
Some of them are listed below.
java.lang
- handles all basic operations and contains the data types.
java.io
- handles all kinds of input and output operations.
java.util
- contains collection based classes and interfaces.
java.awt
- contains user interface components.
java.awt.event
- contains user interface component event listeners.
java.awt.image
- contains image handling classes and interfaces.
8
9. javax.swing
- contains enhanced user interface components.
javax.swing.event
- contains event listeners of enhanced user interface components.
Swings:
Swing is a platform-independent, Model-View-Controller GUI framework for
Java. It follows a single-threaded programming model, and possesses the following
traits:
Platform independence
Swing is platform independent both in terms of its expression (Java) and its
implementation (non-native universal rendering of widgets).
Swing is the primary Java GUI widget toolkit. It is part of Sun Microsystems'
Java Foundation Classes (JFC) — an API for providing a graphical user interface
(GUI) for Java programs.Swing was developed to provide a more sophisticated set of
GUI components than the earlier Abstract Window Toolkit. Swing provides a native
look and feel that emulates the look and feel of several platforms, and also supports a
pluggable look and feel that allows applications to have a look and feel unrelated to
the underlying platform.
The Swing Architecture
Swing is a platform-independent, Model-View-Controller GUI framework for
Java. It follows a single-threaded programming model, and possesses the following
traits:
Foundations
Swing is platform independent both in terms of expression (Java) and
implementation (Look-and-Feel).
9
10. Extensible
Swing is a highly partitioned architecture, which allows for the "plugging" of
various custom implementations of specified framework interfaces: Users can provide
their own custom implementation(s) of these components to override the default
implementations. In general, Swing users can extend the framework by extending
existing (framework) classes and/or providing alternative implementations of core
components.
Customizable
Given the programmatic rendering model of the Swing framework, fine
control over the details of rendering of a component is possible in Swing. As a general
pattern, the visual representation of a Swing component is a composition of a standard
set of elements, such as a "border", "inset", decorations, etc. Typically, users will
programmatically customize a standard Swing component (such as a JTable) by
assigning specific Borders, Colors, Backgrounds, opacities, etc., as the properties of
that component. The core component will then use these properties (settings) to
determine the appropriate renderers to use in painting its various aspects. However, it
is also completely possible to create unique GUI controls with highly customized
visual representation.
Configurable
Swing's heavy reliance on runtime mechanisms and indirect composition
patterns allows it to respond at runtime to fundamental changes in its settings. For
example, a Swing-based application can change its look and feel at runtime. Further,
users can provide their own look and feel implementation, which allows for uniform
changes in the look and feel of existing Swing applications without any programmatic
change to the application code.
Lightweight GUI
Swing's configurability is a result of a choice not to use the native host OS's
GUI controls for displaying itself. Swing "paints" its controls programmatically
through the use of Java 2D APIs, rather than calling into a native user interface
10
11. toolkit. Thus, a Swing component does not have a corresponding native OS GUI
component, and is free to render itself in any way that is possible with the underlying
graphics APIs.
However, at its core every Swing component relies on an AWT container,
since (Swing's) JComponent extends (AWT's) Container. This allows Swing to plug
into the host OS's GUI management framework, including the crucial device/screen
mappings and user interactions, such as key presses or mouse movements. Swing
simply "transposes" its own (OS agnostic) semantics over the underlying (OS
specific) components. So, for example, every Swing component paints its rendition on
the graphic device in response to a call to component. Paint (), which is defined in
(AWT) Container. But unlike AWT components, which delegated the painting to their
OS-native "heavyweight" widget, Swing components are responsible for their own
rendering.
This transposition and decoupling is not merely visual, and extends to Swing's
management and application of its own OS-independent semantics for events fired
within its component containment hierarchies. Generally speaking, the Swing
Architecture delegates the task of mapping the various flavors of OS GUI semantics
onto a simple, but generalized, pattern to the AWT container. Building on that
generalized platform, it establishes its own rich and complex GUI semantics in the
form of the JComponent model.
Loosely-Coupled and MVC
Swing library makes heavy use of the Model/View/Controller software design
pattern, which conceptually decouples the data being viewed from the user interface
controls through which it is viewed. Because of this, most Swing components have
associated models (which are specified in terms of Java interfaces), and the
programmer can use various default implementations or provide their own. The
framework provides default implementations of model interfaces for all of its concrete
components. The view component of a Swing JComponent is the object used to
graphically "represent" the conceptual GUI control. A distinction of Swing, as a GUI
framework, is in its reliance on programmatically-rendered GUI controls (as opposed
to the use of the native host OS's GUI controls). Prior to Java 6 Update 10, this
11
12. distinction was a source of complications when mixing AWT controls, which use
native controls, with Swing controls in a GUI (see Mixing AWT and Swing
components).
Finally, in terms of visual composition and management, Swing favors relative
layouts (which specify the positional relationships between components) as opposed
to absolute layouts (which specify the exact location and size of components). This
bias towards "fluid"' visual ordering is due to its origins in the applet operating
environment that framed the design and development of the original Java GUI toolkit.
(Conceptually, this view of the layout management is quite similar to that which
informs the rendering of HTML content in browsers, and addresses the same set of
concerns that motivated the former.)
Features of Swing components:
i. Swing buttons and labels can display images instead of, or in addition to text.
ii. User can easily add or change the borders drawn around most swing
components.
iii. Users can easily change the behavior or appearance of a swing component by
either invoking methods on it or creating a subclass of it.
iv. Swing components don’t have to be rectangular, buttons, for e.g., can be
round.
v. Assistive technologies such as screen renders can get information from swing
components.
vi. Swing let’s to specify which look and feel a program’s GUI uses.
Swing components are implemented with no native code and aren’t restricted to the
least common denominator.
The Swing API is flexible, powerful and immense. It is available in Two forms:
1. As a core part of the Java2 platform
2. JFC1.1
12
13. JFrame:
The JFrame class is slightly incompatible with Frame. Like all other
JFC/Swing top-level containers, a JFrame contains a JRootPane as its only child. The
content pane provided by the root pane should, as a rule, contain all the non-menu
components displayed by the JFrame. This is different from the AWT Frame case.
JPanel:
JPanel is an extension of Jcomponent used for grouping together other
components. It gets most of its implementations from its superclasses.
JButton:
JButton is a push button that is a replacement for java.awt.Button. Like
AWT buttons, Swing button fire action events when they activated. An action
Listener can register with a button, and the listener’s action performed method will be
invoked whenever the button is activated.
JTextField:
JTextField allow the user to enter a single line of text, scrolling the text if its
size exceeds the physical size of the field. Horizontal alignment either LEFT, RIGHT
or CENTER can be specified for a text field’s text.
JTabbedPane:
The JTabbedPane is used for creating your own tabbed pane with tab
activation components, very quickly.
13
14. Relationship to AWT
Fig4: AWT and Swing class hierarchy
Since early versions of Java, a portion of the Abstract Window Toolkit (AWT)
has provided platform-independent APIs for user interface components. In AWT,
each component is rendered and controlled by a native peer component specific to the
underlying windowing system.
By contrast, Swing components are often described as lightweight because
they do not require allocation of native resources in the operating system's windowing
toolkit. The AWT components are referred to as heavyweight components.
Much of the Swing API is generally a complementary extension of the AWT
rather than a direct replacement. In fact, every Swing lightweight interface ultimately
exists within an AWT heavyweight component because all of the top-level
components in Swing (JApplet, JDialog, JFrame, and JWindow) extend an AWT top-
level container. Prior to Java 6 Update 10, the use of both lightweight and
heavyweight components within the same window was generally discouraged due to
Z-order incompatibilities. However, later versions of Java have fixed these issues, and
both Swing and AWT components can now be used in one GUI without Z-order
issues.
The core rendering functionality used by Swing to draw its lightweight
components is provided by Java 2D, another part of JFC.
14
15. 3.1.2 Software Requirements
• JAVA SWINGS
• JFRAME BUILDER
• WINDOWS XP / WINDOWS 7
3.1.3 Hardware Requirements
SYSTEM : Pentium Dual-Core CPU E5400 2.70GHZ
HARD DISK : 40 GB
FLOPPY DRIVE : 1.44 MB
MONITOR : 15 VGA colour
MOUSE : Logitech.
RAM : 1GB
3.2 System Requirements Analysis
3.2.1 Feasibility Study:
Once the proposals are generated, they are evaluated. Evaluation
looks at the technical, operational and economic feasibility of the project. All are
feasible within the presence of unlimited resources and time. Unfortunately the
development of a computer based system is more likely to be plagued by a scarcity of
resources and difficult delivery dates. It is both necessary and prudent to evaluate the
feasibility of a project at the earliest possible time. Months and years of effort,
thousands or millions of dollars and untold professional embarrassment can be
averted if an ill conceived system is recognized early in the definition phase.
3.2.2 Technical Feasibility:
This evaluation determines whether the technology needed for the proposed
system is available, and how it can be integrated within the organization. For
proposed system, the minimum requirements needed to develop the system are found.
15
16. Since this system uses graphics, more processing speed and memory are needed. The
organization has the expertise to use it.
3.2.3 Operational Feasibility:
Operational feasibility covers two aspects. One is a technical performance aspect and
the other is acceptance within the organization. Technically, the proposed system has
a good operational feasibility because of the availability of the resources such as
processing speed and memory. The proposed system will definitely deliver the right
information in right time. Coming to acceptance within the organization, it will fit in
with the current operations and no additional skills are required and are acceptable to
the current users.
3.2.4Economic Feasibility:
Economic feasibility concerns returns from investments in a project. It
determines whether it is worthwhile to invest the money in the proposed project or
whether something else should be done with it. Some organizations, especially those
with larger projects. Place great emphasis on economic analysis.
3.3 CONTENT DIAGRAM OF PROJECT
16
19. 4 DESIGN
4.1 INTRODUCTION
The design phase is concerned with the physical construction of the system.
The main objective of this phase is to transform the previously defined requirements
into a complete and detailed set of specifications which will be used during the next
phase. Some of the activities that need to take place during the design phase are:
i. Design the application
ii. Design and integrate the network
iii. Create a contingency plan
iv. Start a Maintenance, Training and Operations plan
v. Review the design
vi. Establish a transition strategy
vii. Deliver the System Design Document
viii. Review final design.
4.2 UML DIAGRAMS
UML is a language used for
• visualizing,
• specifying,
• constructing and
• documentary of the system
4.2.1 Use Case Diagram
Use Case diagrams identify the functionality provided by the system (use cases),
the users who interact with the system (actors), and the association between the users
and the functionality. In other words an Use Case diagram is a diagram that has set of
use cases, actors and their relationships.
Graphical Notation The basic components of an Use Case diagrams are the
Actor, the Use Case, and the Association.
19
20. Fig 7: Use case diagram
4.2.2 Sequence Diagram
Sequence diagrams document the interactions between classes to achieve a
result, such as an usecase. Because UML is designed for Object-Oriented
Programming, these communications between classes are known as messages. The
Sequence diagram lists objects horizontally, and time vertically, that represents the
time ordering of messages.
Graphical Notation
20
21. In a Sequence Diagram, Classes and Actors are listed as columns, with vertical
lifelines indicating the lifetime of the object over time.
Fig 8: Sequence diagram
4.2.3 Activity Diagram
21
22. Activity diagrams are graphical representations of workflows of stepwise
activities and actions with support for choice, iteration and concurrency. In
the Unified Modeling Language, activity diagrams can be used to describe the
business and operational step-by-step workflows of components in a system. An
activity diagram shows the overall flow of control.
Graphical Notation:
Activity diagrams are constructed from a limited number of shapes, connected
with arrows. Arrows run from the start towards the end and represent the order in
which activities happen.An activity diagram shows the flow from activity to activity.
An activity is an ongoing non atomic execution within a state machine.
Activity diagrams commonly contain
Activity states and action states
Transitions
Objects
22
24. 4.3 INPUT DESIGN
The input design is the link between the information system and the user. It
comprises the developing specification and procedures for data preparation and those
steps are necessary to put transaction data in to a usable form for processing can be
achieved by inspecting the computer to read data from a written or printed document
or it can occur by having people keying the data directly into the system. The design
of input focuses on controlling the amount of input required, controlling the errors,
avoiding delay, avoiding extra steps and keeping the process simple. The input is
designed in such a way so that it provides security and ease of use with retaining the
privacy. Input Design considered the following things:
What data should be given as input?
How the data should be arranged or coded?
The dialog to guide the operating personnel in providing input.
Methods for preparing input validations and steps to follow when error
occur.
OBJECTIVES
• Input Design is the process of converting a user-oriented description of the
input into a computer-based system. This design is important to avoid errors in
the data input process and show the correct direction to the management for
getting correct information from the computerized system.
• It is achieved by creating user-friendly screens for the data entry to handle
large volume of data. The goal of designing input is to make data entry easier
and to be free from errors. The data entry screen is designed in such a way that
all the data manipulates can be performed. It also provides record viewing
facilities.
24
25. • When the data is entered it will check for its validity. Data can be entered with
the help of screens. Appropriate messages are provided as when needed so that
the user can do it.
4.4 OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and
presents the information clearly. In any system results of processing are
communicated to the users and to other system through outputs. In output design it is
determined how the information is to be displaced for immediate need and also the
hard copy output. It is the most important and direct source information to the user.
Efficient and intelligent output design improves the system’s relationship to help user
decision-making.
The output form of an information system should accomplish one or more of the
following objectives.
Convey information about past activities, current status or projections of the
future
Signal important events, opportunities, problems, or warnings.
Trigger an action.
Confirm an action.
4.5 MODULE DESIGN & ORGANIZATION
MODULES DESCRIPTION
1. Transfer File
2. Energy Watcher
3. Trust Manager
4. Fuzzy routing
5. Receive File
1.Transfer File Module
25
26. In this module, Analysis the Shortest Path algorithm independently routes
each logical link on a physical path with the minimum number of hops in trusted
network basis. Since we are assuming that every physical link fails with the same
probability, the failure probability of path is minimized when it is routed over the
shortest path. Hence, under the algorithm Shortest Path, each light- path greedily
takes the most reliable route and transfers the file.
2. Energy Watcher Module
In this module Cluster-based WSNs allows for the great savings of energy and
bandwidth through aggregating data from children nodes and performing routing and
transmission for children nodes. In a cluster-based WSN, the cluster headers
themselves form a sub-network, after certain data reach a cluster header, the
aggregated data will be routed to a base station only through such a subnetwork
consisting of the cluster headers. Our framework can then be applied to this sub-
network to achieve secure routing for cluster based WSNs.
Here ,for transferring k-bit message over a distance of d, the energy consume
is calculated by the radio model.
Etrans=Eelec(k,d)+Eamp(k,d)
=k*Eelec+k*€fs
=k*Eelec+k*€mp
Where,
k=The number of forwarded bits for a distance d
Eelec=The transmitter circuitry dissipation per bit
€=The transmitter amplifier dissipation per bit
The Receiving cost is computed by the following equation
Erecie=k*Eelec
Model Equation for Total Energy consume
Etotal=Etrans+Eprocess+Esense
26
27. Where
Etotal=Total network Energy cost
Etrans=The transmission cost
Erecie=The receiving cost
Eprocess=The Energy cost while processing
Esense=The Energy cost while sensing
Fig 10: radio model-energy consumption
3. Trust Manager Module
Trust Manager encourages a node to choose another route when its current
route frequently fails to deliver data to the base station. Though only those legal
neighboring nodes of an attacker might have correctly identified the adversary.
Trust value is calculated by reliable and unreliable of the nodes For instance,
the cluster possess 5 sensor nodes i.e., n1, n2, n3, n4 and n5. Then the distance
between the successive nodes is calculated as d1, d2, d3, d4 and d5. The average of
the values is calculated, 1 and compared with threshold value, δ1 of the cluster. Forƞ
instance, the cluster possesses 5 sensor nodes i.e., n1, n2, n3, n4 and n5 and the
difference between the successive readings of every node is rl, r2, r3, r4 and r5. Then
the average value 2 of the readings is compared with its threshold value, 02 of theƞ
cluster. If 1> δ1 and 2< δ2, then the nodes are unreliable. If 1< δ1and 2< δ2,ƞ ƞ ƞ ƞ
27
28. then the nodes are reliable. Two counters called reliable sensing watcher and
unreliable sensing watcher are maintained, for the values of 2 and δ2. It indicates theƞ
reliability of the sensor node. The sensor nodes can be classified as malicious or
compromised node based on the reliability factor. Thus it helps in maintaining the
network data away from that of the malicious nodes.
The RELIABLITY VALUE is estimated using the formula
RVi=RSWi-URWi/RSWi+URWi
Where
RVi=The reliable value of node(1<i<k)
RSWi=The reliable sensing watch of node i
URWi=The unreliable sensing watch of node i
Therefore, the TOTAL TRUST VALUE of the node i is calculated as follows
TTV=W1Ri+W2PDRi+W3RVi/W1+W2+W3
Where
TTV=Total Trust value
PDRi=Packet Delivery Rate of node(1<i<k)
Ri=Residual Energy value of node(1<i<k)
4. FUZZY ROUTING Module
In this module, the networks embedded on the physical fiber topology.
However, assessing the performance reliability achieved independent logical links can
share the same physical link, which can lead to correlated failures. Mainly, we focus
on assessing the reliability of energy level and trusted network by using a fuzzy logic
The rule description is characterized by a membership function which are
effortlessly implemented by fuzzy conditional statements.if the precursor is true to
some degree of membership then the resulting is also true to that same degree.
For the three inputs: distance, power consumed, and trust the resulting
possibilities are BestNode,WorstNode and NormalNode.Here the input can take two
values: Less and High.
28
29. The final decision is made on the basis of output of the intersection of the
equivalent members of the fuzzy sets of the three parameters: distance, power
consumed and trust value as shown in the following table
fig:Fuzzy rules
5. RECEIVE FILE Module
This module will receive file at the sink node that has been transferred which
is used for the client to view the text in a readable format.
29
30. 5 IMPLEMENTATION & RESULTS
5.1 INTRODUCTION
Implementation is the stage of the project when the theoretical design is turned
out into a working system. Thus it can be considered to be the most critical stage in
achieving a successful new system and in giving the user, confidence that the new
system will work and be effective.
The implementation stage involves careful planning, investigation of the existing
system and it’s constraints on implementation, designing of methods to achieve
changeover and evaluation of changeover methods.
During this phase, the system will be installed and evaluated in the Organization’s
operational environment. Key security activities for this phase include:
i. Integrate the information system into its environment;
ii. Plan and conduct system certification activities in synchronization with testing
of security controls; and
iii. Complete system accreditation activities.
Core Functions:
Simple programs that demonstrate basic commands. These are included with
the java programming environment.
if (conditional) and ==, !=, <, > (comparison operators)
if, which is used in conjunction with a comparison operator, tests whether a
certain condition has been reached, such as an input being above a certain number.
The format for an if test is:
if (someVariable > 50)
{
// do something here
30
31. }
The program tests to see if some Variable is greater than 50. If it is, the
program takes a particular action. Put another way, if the statement in parentheses is
true, the statements inside the brackets are run. If not, the program skips over the
code.
The brackets may be omitted after an if statement. If this is done, the next line
(defined by the semicolon) becomes the only conditional statement.
if / else
if/else allows greater control over the flow of code than the basic if statement,
by allowing multiple tests to be grouped together. For example, an analog input could
be tested and one action taken if the input was less than 500, and another action taken
if the input was 500 or greater. The code would look like this:
if (Input < 500)
{
// action A
}
else
{
// action B
}
else can proceed another if test, so that multiple, mutually exclusive tests can be run at
the same time.
Note that an else if block may be used with or without a
terminating else block and vice versa. An unlimited number of such else if branches
are allowed.
Another way to express branching, mutually exclusive tests, is with the switch
case statement.
31
32. Semicolon
Used to end a statement.
Example
int a = 13;
Comments
Comments are lines in the program that are used to inform yourself or others
about the way the program works. They are ignored by the compiler, and not exported
to the processor.
Comments only purpose are to help you understand (or remember) how your
program works or to inform others how your program works. There are two different
ways of marking a line as a comment:
Example
x = 5; // This is a single line comment. Anything after the slashes is a
// comment to the end of the line
Define
#define is a useful C component that allows the programmer to give a name to
a constant value before the program is compiled.The compiler will replace references
to these constants with the defined value at compile time.
This can have some unwanted side effects though, if for example, a constant
name that had been #defined is included in some other constant or variable name. In
that case the text would be replaced by the #defined number (or text).
32
33. In general, the const keyword is preferred for defining constants and should be
used instead of #define.
Syntax
#define constantName value
Example
#define ledPin 3
// The compiler will replace any mention of ledPin with the value 3 at compile
time.
Curly Braces
Curly braces (also referred to as just "braces" or as "curly brackets") are a
major part of the java programming language. They are used in several different
constructs, outlined below, and this can sometimes be confusing for beginners.
An opening curly brace "{" must always be followed by a closing curly brace
"}". This is a condition that is often referred to as the braces being balanced. Just
select a brace, or even click the insertion point immediately following a brace, and its
logical companion will be highlighted.
Beginning programmers, and programmers coming to C from the BASIC
language often find using braces confusing or daunting. After all, the same curly
braces replace the RETURN statement in a subroutine (function), the ENDIF
statement in a conditional and the NEXT statement in a FOR loop.
Because the use of the curly brace is so varied, it is good programming
practice to type the closing brace immediately after typing the opening brace when
inserting a construct which requires curly braces. Then insert some carriage returns
between your braces and begin inserting statements. Your braces, and your attitude,
will never become unbalanced.
Unbalanced braces can often lead to cryptic, impenetrable compiler errors that
can sometimes be hard to track down in a large program. Because of their varied
33
34. usages, braces are also incredibly important to the syntax of a program and moving a
brace one or two lines will often dramatically affect the meaning of a program.
The main uses of curly braces
Functions
void myfunction(datatype argument)
{
statements(s)
}
Loops
while (boolean expression)
{
statement(s)
}
do
{
statement(s)
} while (boolean expression);
for (initialisation; termination condition; incrementing expr)
{
statement(s)
}
Data types:
Void
The void keyword is used only in function declarations. It indicates that the
function is expected to return no information to the function from which it was called.
34
35. unsigned int Description
The Due stores a 4 byte (32-bit) value, ranging from 0 to 4,294,967,295 (2^32
- 1). The difference between unsigned ints and (signed) ints, lies in the way the
highest bit, sometimes refered to as the "sign" bit, is interpreted. In the Arduino int
type (which is signed), if the high bit is a "1", the number is interpreted as a negative
number, and the other 15 bits are interpreted with 2's complement math.
Syntax
unsigned int var = val;
• var - your unsigned int variable name
• val - the value you assign to that variable
Example
• unsigned int ledPin = 13;
5.2 EXPLANATION OF KEY FUNCTIONS
5.2.1 Basic Design of a FBTARF
The FBTARF is created using the JTabbedPane. This Component includes
three panels namely Transfer file, Energy Watcher and Trust Manager. The syntax
for creating the FBTARF using tabbed pane is:
JTabbedPane tabbedpane = new JTabbedPane();
5.2.2 Accessing Notepad files through Java
35
36. The sensing data of a sensor node can be saved into the notepad file and can
be accessed by browsing the file and this file is send to the sink node by using fuzzy
based routing. The notepad files can be accessed by the following syntax
JFileChooser chooser = new JFileChooser();
File f = new File(new File("").getCanonicalPath());
File field = chooser.getSelectedFile();
5.2.3 Accessing EnergyWatcher through Java
Here to calculate the total energy cost of a wireless sensor network a
EnergyWatcher class is invoked by using the following syntax
EnergyWatcher e= new EnergyWatcher ();
new EnergyWatcher ();
By accessing this class we can calculate the transmission, receiving and total
energy cost of a wireless sensor network is calculated.
5.2.4 Accessing TrustManager through Java
Here to calculate the trust values of a wireless sensor network a TrustManager
class is invoked by the following syntax
TrustManager e= new TrustManager();
new TrustManager();
By accessing this class we can calculate the trust values of a wireless sensor
network and the source file is routed to the sensor node whose trust value is high by
considering the node as best node or normal node.
36
68. 6. TESTING AND VALIDATION
6.1 INTRODUCTION
Testing is a process of comparing the state of a system/application against a
set of criteria. In the security industry, people frequently test against a set of mental
criteria that are neither well defined nor complete.
Validation checks that the product design satisfies or fits the intended use
(high-level checking), i.e., the software meets the user requirements. This is done
through dynamic testing and other forms of review.
A perfect software product is built when every step is taken with full
consideration that 'a right product is developed in a right manner'. 'Software
Verification & Validation' is one such model, which helps the system designers and
test engineers to confirm that a right product is built in the right way throughout the
development process and improve the quality of the softwareproduct.
'Testing & Validation Model' makes it sure that, certain rules are followed at
the time of development of a software product and also makes it sure that the product
that is developed fulfills the required specifications.
Software Testing and Validation is a disciplined approach to assessing software
products throughout the product life cycle. A T&V effort strives to
ensure that quality is built into the software.
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal
program logic is functioning properly, and that program inputs produce valid outputs.
All decision branches and internal code flow should be validated. It is the testing of
individual software units of the application .it is done after the completion of an
individual unit before integration. This is a structural testing, that relies on knowledge
68
69. of its construction and is invasive. Unit tests perform basic tests at component level
and test a specific business process, application, and/or system configuration. Unit
tests ensure that each unique path of a business process performs accurately to the
documented specifications and contains clearly defined inputs and expected result.
Integration testing
Integration tests are designed to test integrated software components to
determine if they actually run as one program. Testing is event driven and is more
concerned with the basic outcome of screens or fields. Integration tests demonstrate
that although the components were individually satisfaction, as shown by successfully
unit testing, the combination of components is correct and consistent. Integration
testing is specifically aimed at exposing the problems that arise from the
combination of components.
Functional test
Functional tests provide systematic demonstrations that functions tested are
available as specified by the business and technical requirements, system
documentation, and user manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be exercised.
Systems/Procedures: interfacing systems or procedures must be invoked.
Organization and preparation of functional tests is focused on requirements, key
functions, or special test cases. In addition, systematic coverage pertaining to identify
Business process flows; data fields, predefined processes, and successive processes
must be considered for testing. Before functional testing is complete, additional tests
are identified and the effective value of current tests is determined.
69
70. System Test
System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results. An
example of system testing is the configuration oriented system integration test.
White Box Testing
White Box Testing is a testing in which in which the software tester has
knowledge of the inner workings, structure and language of the software, or at least its
purpose. It is purpose. It is used to test areas that cannot be reached from a black box
level.
Black Box Testing
Black Box Testing is testing the software without any knowledge of the inner
workings, structure or language of the module being tested. Black box tests, as most
other kinds of tests, must be written from a definitive source document, such as
specification or requirements document, such as specification or requirements
sdocument. It is a testing in which the software under test is treated, as a black box
.you cannot “see” into it. The test provides inputs and responds to outputs without
considering how the software works.
Fig 11 : Black Box Testing
This method is named so because the software program, in the eyes of the tester, is
like a black box; inside which one cannot see. Black Box Testing is contrasted
70
71. with White Box Testing. View Differences between Black Box Testing and White
Box Testing.
This method of attempts to find errors in the following categories:
a. Incorrect or missing functions
b. Interface errors
c. Errors in data structures or external database access
d. Behavior or performance errors
e. Initialization and termination errors.
Advantages
The advantages of this type of testing include:
i. The test is unbiased because the designer and the tester are independent of
each other.
ii. The tester does not need knowledge of any specific programming
languages.
iii. The test is done from the point of view of the user, not the designer.
iv. Test cases can be designed as soon as the specifications are complete.
Disadvantages
The disadvantages of this type of testing include:
i. The test can be redundant if the software designer has already run a test
case.
ii. The test cases are difficult to design.
iii. Testing every possible input stream is unrealistic because it would take a
inordinate amount of time; therefore, many program paths will go untested
6.2 VALIDATION
Unit Testing:
71
72. Unit testing is usually conducted as part of a combined code and unit test
phase of the software lifecycle, although it is not uncommon for coding and unit
testing to be conducted as two distinct phases.
Test strategy and approach
Field testing will be performed manually and functional tests will be written in
detail.
Test objectives
• All field entries must work properly.
• Pages must be activated from the identified link.
• The entry screen, messages and responses must not be delayed.
Features to be tested
• Verify that the entries are of the correct format
• No duplicate entries should be allowed
• All links should take the user to the correct page.
Integration Testing
Software integration testing is the incremental integration testing of two or
more integrated software components on a single platform to produce failures caused
by interface defects.
The task of the integration test is to check that components or software
applications, e.g. components in a software system or – one step up – software
applications at the company level – interact without error.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
Acceptance Testing
72
73. User Acceptance Testing is a critical phase of any project and requires
significant participation by the end user. It also ensures that the system meets the
functional requirements.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
7.CONCLUSION AND FUTURE ENHANCEMENT
With the concept of innovative trust management, FBTARF enables a node to
keep track of the trustworthiness of its neighbors and there by select a reliable route
path. Our main submissions are listed below.
1) Fuzzy based TARF effectively protects WSN from severe attacks through dynamic
replaying routing information. Without time synchronization and known geographic
information, fuzzification rules are formed based on dynamic mobility of the nodes.
2). Extensive simulation and empirical analysis with large-scale WSN produces high
resilience and scalability while using FBT ARF and its proved by the graphical
analysis.
3). Finally, we demonstrate a proof-of-concept mobility based target detection
application using trust, energy cost and distance estimators that are formulated on top
of the Fuzzy based TARF.
The work can be extended in building a Fuzzy based TARF algorithm that
takes not only Trust level and power level of each node but also the performance
capacity of each node for efficiency improvement. The algorithm can be added to any
existing routing algorithm for Trust and power management. The effectiveness of
node can be easily found out by adding additional data aggregation about each node's
capacity. Our Technique FBT ARF is compared with multiple protocols like CTP and
TARF to produce high throughput and PDR rate and less energy consumption.
73
74. BIBLIOGRAPHY
[1] . Guoxing Zhan, Weisong Shi, Senior Member, IEEE, and Julia Deng -
Design and Implementation of TARF: A Trust Aware Routing Framework for
WSNs - IEEE 2012 Transactions on Dependable and Secure Computing, Volume:
9, Issue: 2
[2] . F. Zhao and L. Guibas, Wireless Sensor Networks: An Information
Processing Ap proach. Morgan Kaufmann Publishers, 2004.
[3]. A. Wood and J. Stankovic, "Denial of service in sensor networks,"
Computer, vol. 35, no. 10, pp. 54-62, Oct 2002.
[4] . C. Karlof and D. Wagner, "Secure routing in wireless sensor networks:
attacks and countermeasures," in Proceedings of the 1st IEEE International
Workshop on Sensor Network Protocols and Ap plications, 2003.
[5]. AI-Azawi, S., S. Boussakta and A. Yakovlev, 2012. Image compression
algorithms using intensity based adaptive quantization coding. Am. J. Eng.
Applied Sci., 4: 504-512. 001: I 0.3844/ajeassp.20 11.504.512
[6]. Bhoopathy, V. and R.M.S. Parvathi, 2012. Energy constrained secure
hierarchical data aggregation in wireless sensor networks. Am. J. Applied Sci.,
9: 858-864. 001: 1 0.3844/ajassp.20 12.858.864
74
75. [7]. Ozdemir, S. and Y. Xiao, 2009. Secure data aggregation in wireless sensor
networks: A comprehensive overview. Comput. Netw., 53: 2022-2037. 001:
10.10 16/j.comnet.2009.02.023
[8]. L. Bai, F. Ferrese, K. Ploskina, and S. Biswas, "Performance analysis of
mobile agent-based wireless sensor network," in Proceedings of the 8th
International Conference on Reliability, Maintainability and Safety (ICRMS
2009), 20-24 2009,pp. 16 -19.s
75