Intrusion
Detection in Homogeneous and Heterogeneous
Wireless Sensor Networks
1.
Abstract:
Intrusion detection in
Wireless Sensor Network (WSN) is of practical interest in many applications
such as detecting an intruder in a battlefield. The intrusion detection is
defined as a mechanism for a WSN to detect the existence of inappropriate,
incorrect, or anomalous moving attackers. In this paper, we consider this issue
according to heterogeneous WSN models. Furthermore, we consider two sensing
detection models: single-sensing detection and multiple-sensing detection...
Our simulation results show the advantage of multiple sensor heterogeneous
WSNs.
2.
Introduction:
A Wireless Sensor Network (WSN) is a collection of
spatially deployed wireless sensors by which to monitor various changes of
environmental conditions (e.g., forest fire, air pollutant concentration, and
object moving) in a collaborative manner without relying on any underlying
infrastructure support .Recently, a number of research efforts have been made
to develop sensor hardware and network architectures in order to effectively
deploy WSNs for a variety of applications. Due to a wide diversity of WSN
application requirements, however, a general-purpose WSN design cannot fulfill
the needs of all applications. Many network parameters such as sensing range,
transmission range, and node density have to be carefully considered at the
network design stage, according to specific applications. To achieve this, it
is critical to capture the impacts of network parameters on network performance
with respect to application specifications. Intrusion detection (i.e., object
tracking) in a WSN can be regarded as a monitoring system for detecting the
intruder that is invading the network domain.
The
intrusion detection application concerns how fast the intruder can be detected
by the WSN. If sensors are deployed with a high density so that the union of
all sensing ranges covers the entire network area, the intruder can be
immediately detected once it approaches the network area. However, such a
high-density deployment policy increases the network investment and may be even
unaffordable for a large area. In fact, it is not necessary to deploy so many
sensors to cover the entire WSN area in many applications, since a network with
small and scattered void areas will also be able to detect a moving intruder
within a certain intrusion distance. In this case, the application can specify
a required intrusion distance within which the intruder should be detected. As
shown in Fig. 1, the intrusion distance is referred as D and defined as the
distance between the points the intruder enters the WSN, and the point the
intruder is detected by the WSN system. This distance is of central interest to
a WSN used for intrusion detection. In this paper, we derive the expected
intrusion distance and evaluate the detection probability in different
application scenarios.. For example, given an expected detection distance EðDÞ,
we can derive the node density with respect to sensors’ sensing range, thereby
knowing the total number of sensors required for WSN deployment.
In a WSN,
there are two ways to detect an object (i.e., an intruder): single-sensing
detection and multiple-sensing detection. In the single-sensing detection, the intruder
can be successfully detected by a single sensor. On the contrary, in the
multiple-sensing detection, the intruder can only be detected by multiple
collaborating sensors .In some applications, the sensed information provided by
a single sensor might be inadequate for recognizing the intruder. It is because
individual sensors can only sense a portion of the intruder. For example, the
location of an intruder can only be determined from at least three sensors’
sensing.
In view
of this, we analyze the intrusion detection problem under two application
scenarios: single-sensing detection and multiple-sensing detection. According
to the capability of sensors, we consider two network types: homogeneous and
heterogeneous WSNs We define the sensor capability in terms of the sensing
range and the transmission range. In a heterogeneousWSN some sensors have a
larger sensing range and more power to achieve a longer transmission range. In
this paper, we show that the heterogeneous WSN increases the detection probability
for a given intrusion detection distance. This motivates us to analyze the
network connectivity in this paper. Furthermore, in a heterogeneous WSN, high
capability sensors usually undertake more important tasks (i.e., broadcasting
power management information or synchronization information to all the sensors
in the network),it is also desirable to define and examine the broadcast
reachability from high-capability sensors. The network connectivity and
broadcast reachability are important conditions to ensure the detection
probability in WSNs. They are formally defined and analyzed in this paper. To
the best of our knowledge, our effect is the first to address this issue in a
heterogeneous WSN.
3. Literature Survey
5.3.1Intrusion
detection
An Intrusion detection system (IDS)
is software and/or hardware designed to detect unwanted attempts at accessing,
manipulating, and/or disabling of computer mainly through a network, such as
the Internet. These attempts may take the form of attacks, as examples, by
crackers,, malwarer and/or disgruntled employees. IDS cannot directly detect
attacks within properly encrypted traffic.
An intrusion detection system is used to detect
several types of malicious behaviors that can compromise the security and trust
of a computer system. This includes network attacks against vulnerable
services, data driven attacks on applications, host based attacks such as
privilege escalation, unauthorized logins and access to sensitive files, and
viruses
IDS can be composed of several components: Sensors
which generate security events, a Console to monitor events and alerts
and control the sensors, and a central Engine that records events logged
by the sensors in a database and uses a system of rules to generate alerts from
security events received. There are several ways to categorize an IDS depending
on the type and location of the sensors and the methodology used by the engine
to generate alerts. In many simple IDS implementations all three components are
combined in a single device or appliance.
5.3.2. Wireless
Sensor Network (WSN).
A wireless sensor network (WSN)
is a wireless network consisting of spatially distributed autonomous devices
using sensors to cooperatively monitor physical or environmental conditions,
such as temperature, sound, vibration, pressure, motion or pollutants, at
different locations The development of wireless sensor networks was originally
motivated by military applications such as battlefield surveillance. However,
wireless sensor networks are now used in many civilian application areas,
including environment and habitat monitoring, healthcare applications, home
automation, and traffic control
In addition to one or more
sensors, each node in a sensor network is typically equipped with a radio
transceiver or other wireless communications device, a small microcontroller,
and an energy source, usually a battery. The envisaged size of a single sensor
node can vary from shoebox-sized nodes down to devices the size of grain of
dust although functioning 'motes' of genuine microscopic dimensions have yet to
be created. The cost of sensor nodes is similarly variable, ranging from
hundreds of dollars to a few cents, depending on the size of the sensor network
and the complexity required of individual sensor nodes. Size and cost
constraints on sensor nodes result in corresponding constraints on resources
such as energy, memory, computational speed and bandwidth.
A sensor network normally constitutes a wireless
ad-hoc network, meaning that each sensor supports a multi-hop routing algorithm
(several nodes may forward data packets to the base station).
5.4. System Analysis
5.4.1.
Existing System:
1
single-sensing detection, the intruder can be
successfully detected by a single sensor
2
Previous work was according to homogeneous
single sensor in wireless sensor network
3
It is because individual sensors can only sense
a portion of the intruder.
5.4.2. Proposed System:
1
Intrusion detection in heterogeneous WSNs by
characterizing intrusion
detection with respect to the network parameters
2
Two detection models are:
Single-sensing
detection
Multiple-sensing
detection models
These are two detection
models
1
We are detecting the intruder both single sensor
and multiple sensor heterogeneous wireless sensor network.
5.4.3.
Disadvantage:
1
The sensed information provided by a single sensor might be inadequate for
recognizing the intruder.
2
So that there is no guarantee for our
information has been sent securely.
5.4.5.
Advantage:
1
Through sensing the network we able to find
possible node in the wireless Sensor network.
2
By finding the intruders we can send our
information in a secured manner.
6.
System Requirements:
6.1. Hardware:
PROCESSOR :
PENTIUM IV 2.6 GHz
RAM :
512 MB DD RAM
MONITOR
: 15” COLOR
HARD
DISK : 20 GB
CDDRIVE
: LG 52X
KEYBOARD :
STANDARD 102 KEYS
MOUSE
: 3 BUTTONS
6.2.
Software:
FRONT
END : Java
TOOL
USED : JFrameBuilder
OPERATING
SYSTEM : Window’s Xp
how could i get above project code WiDS
ReplyDelete