SlideShare uma empresa Scribd logo
1 de 21
WIRELESS SENSOR NETWORKS
Introduction
• In this paper, we focus on defending against
  the wormhole attack in the DV-Hop
  localization process, i.e., overcoming the
  impacts of the wormhole attack on the DV-
  Hop localization.
• We propose a label-based secure localization
  scheme which is wormhole attack resistant
  based on the DV-Hop localization process.
OBJECTIVE OF LABEL BASED SECURE LOCALIZATION


• We analyze the impact of the wormhole
  attack on the DV-Hop localization process.

• We propose a wormhole attack resistant
  approach that can remove the packets
  delivered through the wormhole link to
  achieve secure localization.
Literature Review
Existing System
• Wormhole attack detection algorithm using a
  hop counting technique as a probe procedure,
  reconstructing a local map for each node and
  using a “diameter” feature to detect
  abnormalities caused by wormholes.

                                   continued…
Literature Review
• The wormhole attack detection scheme
  adopts the maximum number of independent
  neighbors of two non-neighbor nodes.

• Existing Wormhole attacks can negatively
  affect the localization in wireless sensor
  networks.
Proposed System
• We describe our proposed wormhole attack
  resistant localization scheme, called label-
  based DV Hop localization.

• The label-based DV-Hop localization scheme
  includes three phases, beacon nodes labeling,
  sensor nodes labeling, and DV-Hop-based
  secure localization.
Proposed System(continued)
• The beacon nodes are differentiated and
  labeled according to their geographic
  relationship under a wormhole attack.

• After eliminating the illegal connections
  among the labeled neighboring nodes which
  are contaminated by the wormhole attack,
  the DV Hop localization procedure can be
  successfully conducted.
System Requirments
HARDWARE REQUIREMENTS:

Processor       : Pentium IV 2.8GHz.
RAM             : 512 MB RAM.
Hard Disk : 40 GB.
Input device    : Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
System Requirments
SOFTWARE REQUIREMENTS:

Operating System   :   Windows XP
Language           :   JDK 1.5.
SYSTEM DESIGN
DATAFLOW DIAGRAM
USE CASE DIAGRAM
STATE DIAGRAM
SEQUENCE DIAGRAM
DV-HOP LOCALIZATION
The main idea of our scheme is to generate a pseudo
neighbor list for each beacon node, use all pseudo
neighbor lists received from neighboring beacon
nodes to classify all attacked nodes into different
groups, and then label all neighboring nodes
(including beacons and sensors). According to the
labels of neighboring nodes, each node prohibits the
communications with its pseudo neighbors, which
are attacked by the wormhole attack.
WORMHOLE ATTACK
We address the Security issue of the
wormhole attack upon the range-free DV-Hop
based localization process. We analyze the
impacts of wormhole attack on DV-Hop
localization scheme. Based on the basic DV-
Hop localization process, we propose a label-
based secure localization scheme to defend
against the wormhole attack.
BASIC DV-HOP LOCALIZATION
“Basic DV-Hop Localization without Wormhole
Attack” indicates the relative localization error for
the DV-Hop localization scheme when there is no
wormhole attack. We can see that the curve is quite
stable when the ratio of beacons to sensors varies,
which suggests that the accuracy of the DV-hop
localization is insensitive to the number of beacons
in the network. Therefore, this curve is used as the
reference when the wormhole attack exists.
LABEL-BASED DV-HOP LOCALIZATION

We propose a label-based secure localization
scheme to defend against the wormhole
attack. Simulation results demonstrate that
our proposed secure localization scheme is
capable of detecting the wormhole attack and
resisting its adverse impacts with a high
probability.
Conclusion
We analyze the severe impacts of the
wormhole attack on the DV-Hop based
localization in wirelesssensor networks. To
tackle this secure problem, wepropose a label-
based secure localization scheme to detect
and resist the wormhole attack for the DV-
Hop localization process. We also conduct
simulations to demonstrate the effectiveness
of our proposed scheme under different
network parameters.
FUTURE ENHANCEMENT
The proposed scheme works well in the
scenario when the network has no packet
loss, and the transmission ranges of all nodes
are identical. In our future work, we will
extend our secure localization scheme to
tolerate the packet loss. Also, we will consider
the scenario when different types of nodes
have different transmission ranges.
REFERENCES
• H. Chen, W. Lou, and Z. Wang, “A Consistency-based Secure
  Localization Scheme AgainstWormhole Attacks in WSNs,”in
  Proc. of the International Conference on Wireless Algorithms,
  Systems and Applications (WASA), 2009.
• H. Chen, W. Lou, X. Sun, and Z. Wang, “A Secure Localization
  Approach Against Wormhole Attacks Using Distance
  Consistency,” Eurasip Journal on Wireless Communications
  and Networking, Spacial Issue on Wireless Network
  Algorithms, Systems, and Applications, 2009.
REFERENCES(continued)
W. Wang and A. Lu, “Interactive wormhole detection and
evaluation,”Information Visualization, vol. 6, no. 1, pp. 3–17,
2007.
 ——, “HiRLoc: High-Resolution Robust Localization for
Wireless Sensor Networks,” IEEE Journal on Selected Areas in
Communications, vol. 24, no. 2, pp. 233–246, 2006.
 S. Capkun, M. Cagalj, and M. Srivastava, “Secure Localization
With Hidden and Mobile Base Stations,” in Proc. of IEEE
INFOCOM, 2006.

Mais conteúdo relacionado

Mais procurados

NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsIOSR Journals
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesIJNSA Journal
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBirju Tank
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
Ad hoc secuirty-vemula
Ad hoc secuirty-vemulaAd hoc secuirty-vemula
Ad hoc secuirty-vemulaRaju Vemula
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 

Mais procurados (20)

Ppt
PptPpt
Ppt
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
D0961927
D0961927D0961927
D0961927
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
Ad hoc secuirty-vemula
Ad hoc secuirty-vemulaAd hoc secuirty-vemula
Ad hoc secuirty-vemula
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
A43030104
A43030104A43030104
A43030104
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 

Destaque

Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...ambitlick
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification DocumentationSambit Dutta
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...Munisekhar Gunapati
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer NetworksVenkatesh Iyer
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Performance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi ApproachPerformance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi ApproachIJMER
 
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board""Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board"Disha Modi
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor networkfrestoadi
 

Destaque (15)

Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
 
I Mouse
I MouseI Mouse
I Mouse
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
 
Wormholes
WormholesWormholes
Wormholes
 
Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Performance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi ApproachPerformance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi Approach
 
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board""Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
 
UNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSUNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKS
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
 

Semelhante a DV-Hop Localization Scheme Resists Wormhole Attacks

A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractvishnuRajan20
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksJPINFOTECH JAYAPRAKASH
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksJPINFOTECH JAYAPRAKASH
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodvjournal ijrtem
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...IEEEGLOBALSOFTTECHNOLOGIES
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksIEEEFINALYEARPROJECTS
 
Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBittu Roy
 
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMSWORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMSI3E Technologies
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...IRJET Journal
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsVijay Karan
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsVijay Karan
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksJPINFOTECH JAYAPRAKASH
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
 
Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd Iaetsd
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 

Semelhante a DV-Hop Localization Scheme Resists Wormhole Attacks (20)

A detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstractA detection & prevention of wormhole attack in wsn project abstract
A detection & prevention of wormhole attack in wsn project abstract
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant network
 
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMSWORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor network
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projects
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 Projects
 
I1802046780
I1802046780I1802046780
I1802046780
 
B43040610
B43040610B43040610
B43040610
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based on
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
O010528791
O010528791O010528791
O010528791
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Último (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

DV-Hop Localization Scheme Resists Wormhole Attacks

  • 2. Introduction • In this paper, we focus on defending against the wormhole attack in the DV-Hop localization process, i.e., overcoming the impacts of the wormhole attack on the DV- Hop localization. • We propose a label-based secure localization scheme which is wormhole attack resistant based on the DV-Hop localization process.
  • 3. OBJECTIVE OF LABEL BASED SECURE LOCALIZATION • We analyze the impact of the wormhole attack on the DV-Hop localization process. • We propose a wormhole attack resistant approach that can remove the packets delivered through the wormhole link to achieve secure localization.
  • 4. Literature Review Existing System • Wormhole attack detection algorithm using a hop counting technique as a probe procedure, reconstructing a local map for each node and using a “diameter” feature to detect abnormalities caused by wormholes. continued…
  • 5. Literature Review • The wormhole attack detection scheme adopts the maximum number of independent neighbors of two non-neighbor nodes. • Existing Wormhole attacks can negatively affect the localization in wireless sensor networks.
  • 6. Proposed System • We describe our proposed wormhole attack resistant localization scheme, called label- based DV Hop localization. • The label-based DV-Hop localization scheme includes three phases, beacon nodes labeling, sensor nodes labeling, and DV-Hop-based secure localization.
  • 7. Proposed System(continued) • The beacon nodes are differentiated and labeled according to their geographic relationship under a wormhole attack. • After eliminating the illegal connections among the labeled neighboring nodes which are contaminated by the wormhole attack, the DV Hop localization procedure can be successfully conducted.
  • 8. System Requirments HARDWARE REQUIREMENTS: Processor : Pentium IV 2.8GHz. RAM : 512 MB RAM. Hard Disk : 40 GB. Input device : Keyboard and Mouse. Output device : VGA and High Resolution Monitor.
  • 9. System Requirments SOFTWARE REQUIREMENTS: Operating System : Windows XP Language : JDK 1.5.
  • 14. DV-HOP LOCALIZATION The main idea of our scheme is to generate a pseudo neighbor list for each beacon node, use all pseudo neighbor lists received from neighboring beacon nodes to classify all attacked nodes into different groups, and then label all neighboring nodes (including beacons and sensors). According to the labels of neighboring nodes, each node prohibits the communications with its pseudo neighbors, which are attacked by the wormhole attack.
  • 15. WORMHOLE ATTACK We address the Security issue of the wormhole attack upon the range-free DV-Hop based localization process. We analyze the impacts of wormhole attack on DV-Hop localization scheme. Based on the basic DV- Hop localization process, we propose a label- based secure localization scheme to defend against the wormhole attack.
  • 16. BASIC DV-HOP LOCALIZATION “Basic DV-Hop Localization without Wormhole Attack” indicates the relative localization error for the DV-Hop localization scheme when there is no wormhole attack. We can see that the curve is quite stable when the ratio of beacons to sensors varies, which suggests that the accuracy of the DV-hop localization is insensitive to the number of beacons in the network. Therefore, this curve is used as the reference when the wormhole attack exists.
  • 17. LABEL-BASED DV-HOP LOCALIZATION We propose a label-based secure localization scheme to defend against the wormhole attack. Simulation results demonstrate that our proposed secure localization scheme is capable of detecting the wormhole attack and resisting its adverse impacts with a high probability.
  • 18. Conclusion We analyze the severe impacts of the wormhole attack on the DV-Hop based localization in wirelesssensor networks. To tackle this secure problem, wepropose a label- based secure localization scheme to detect and resist the wormhole attack for the DV- Hop localization process. We also conduct simulations to demonstrate the effectiveness of our proposed scheme under different network parameters.
  • 19. FUTURE ENHANCEMENT The proposed scheme works well in the scenario when the network has no packet loss, and the transmission ranges of all nodes are identical. In our future work, we will extend our secure localization scheme to tolerate the packet loss. Also, we will consider the scenario when different types of nodes have different transmission ranges.
  • 20. REFERENCES • H. Chen, W. Lou, and Z. Wang, “A Consistency-based Secure Localization Scheme AgainstWormhole Attacks in WSNs,”in Proc. of the International Conference on Wireless Algorithms, Systems and Applications (WASA), 2009. • H. Chen, W. Lou, X. Sun, and Z. Wang, “A Secure Localization Approach Against Wormhole Attacks Using Distance Consistency,” Eurasip Journal on Wireless Communications and Networking, Spacial Issue on Wireless Network Algorithms, Systems, and Applications, 2009.
  • 21. REFERENCES(continued) W. Wang and A. Lu, “Interactive wormhole detection and evaluation,”Information Visualization, vol. 6, no. 1, pp. 3–17, 2007. ——, “HiRLoc: High-Resolution Robust Localization for Wireless Sensor Networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 233–246, 2006. S. Capkun, M. Cagalj, and M. Srivastava, “Secure Localization With Hidden and Mobile Base Stations,” in Proc. of IEEE INFOCOM, 2006.