SlideShare une entreprise Scribd logo
1  sur  24
REDUNDANCY MANAGEMENT IN 
HETEROGENEOUSWIRELESS 
SENSOR NETWORKS 
By: Saeid Hossein Pour lotomi 
Roll No: 12011D4026 
Guide: Ms.E.Hemalatha
Overview 
• Introduction 
• Modules 
• Screenshots 
• Conclusion 
• Future work 
• References
Introduction 
• WSNs are deployed in an unattended 
environment. 
• limited resources, a WSN must satisfy: 
i. QoS requirements and also 
ii. minimize energy consumption 
 to prolong the system useful lifetime. 
• Tradeoff between energy consumption vs. 
QoS gain with the goal to maximize the WSN 
system lifetime has been well explored in the 
literature. 
• No prior work exists to consider the tradeoff 
in the presence of malicious attackers.
The components of a sensor node
What is Wireless Sensor 
Networks? 
• WSN is composed of a large number of wireless sensors 
with low processing power and energy consumption for 
monitoring a certain environment 
• In mathematics, a Voronoi diagram is a way of dividing space into 
a number of regions.
Modules 
I. Attack Scenario 
II. Compromised Node 
III. Redundancy Management 
IV. Dynamic Redundancy Management 
Algorithm
Attack Scenario 
• All sensors are subject to capture attacks 
• Intrusion/fault Tolerance 
Through multipath routing 
• Two most energy conserving attacks 
I. Bad-mouthing attack 
II. Packet dropping attacks
Compromised Node 
• To detect compromised nodes, every node runs 
a simple host IDS to assess its neighbors. 
• The IDS is light-weight to conserve energy. It is 
also generic and does not rely on the feedback 
mechanism tied in with a specific routing 
protocol . 
• It is based on local monitoring. That is, each 
node monitors its neighbor nodes only. 
• To remove malicious nodes from the system, a 
votingbased distributed IDS is applied 
periodically in every TIDS (IDS interval time(sec)). 
• It analyses the network by collecting sufficient 
amount of data and detects unusual behavior of 
sensor node.
Redundancy Management 
• Increase source or path redundancy enhance 
reliability , security. However, it also increases 
the energy consumption (system lifetime). 
• Tradeoff between QoS vs. energy consumption 
by using distributed IDS. 
• Maximize life time of a HWSN(MTTF)
Algorithm for Dynamic Redundancy 
Management of multipath routing 
algorithm. 
The objective of dynamic 
redundancy management is to 
dynamically identify and apply the 
best redundancy level in terms of 
path redundancy (mp) and source 
redundancy (ms), as well as the 
best intrusion detection settings in 
terms of the number of voters (m) 
and the intrusion invocation 
interval (TIDS) to maximize MTTF.
CH Execution for Dynamic Redundancy 
Management. 
1: CH Execution: 
2: Get next event 
3: if event is TD timer then 
4: determine radio range to maintain CH connectivity 
5: determine optimal TIDS,m,ms,mP 
6: notify SNS within the cluster of the new 
optimal settings of TIDS and m 
7: else if event is query arrival then 
8: trigger multipath routing using mS and mP 
9: else if event is Tclustering timer then 
10: perform clustering 
11: else if event is TIDS timer then 
12: for each neighbor CH 
13: if selected as a voter then 
14: execute voting based intrusion 
detection 
15: else // event is data packet arrival 
16: follow multipath routing protocol design to route 
the data packet
SN Execution for Dynamic Redundancy 
Management 
1: SN Execution: 
2: Get next event 
3: if event is TD timer then 
4: determine radio range to maintain CH connectivity 
within a cluster 
5: else if event is control packet arrival from CH then 
6: change the optimal settings of TIDS and m 
7: else if event is Tclustering timer then 
8: perform clustering 
9: else if event is TIDS timer then 
10: for each neighbor SN 
11: if selected as a voter then 
12: execute voting based intrusion 
detection 
13: else // event is data packet arrival 
14: follow multipath routing protocol design to route the 
data packet
SCREENSHOTS
Source
Routing
Routing
Routing
Routing
Routing
Destination
Conclusion 
• A HWSN is maximized for reliability, 
timeliness and security requirements of 
query processing applications in the 
presence of unreliable wireless 
communication and malicious nodes. 
• The design of a dynamic redundancy 
management algorithm to identify and apply 
the best design parameter settings at 
runtime in response to prolong the system 
lifetime. HWSN utilize multipath routing, 
used to minimize the energy consumption 
and reduce the failure node and transfer the 
information in security manner.
Future work 
For future work, we can explore more extensive 
malicious attacks in addition to packet dropping 
and bad mouthing attacks, each with different 
implications to energy, security and reliability, 
and investigate intrusion detection and 
multipath routing based tolerance protocols to 
react to these attacks.
References 
• [1] Azzedine Boukerche, “Algorithms and protocols for wireless sensor networks” Willey, 2009. 
• [2] W.Dargie,Ch.poellabauer,“Fundamentals of wireless sensor networks” Willey, 2010. 
• [3] Ian F.Akylidiz, M. Can Vruan“Wireless sensor networks” Willey, 2010. 
• [4] Ankita Joshi, Lakshmi Priya “A Survey of Hierarchical Routing Protocols in Wireless Sensor 
Network” NIT Hamirpur. 
• [5] Kinjal Patel, Himanshu Arora, Pradeep Jha “Hierarchical routing protocol in wireless sensor 
network” IJATER. 
• [6] Fiach Reid, “Network Programming in .NET” Elsevier Digital Press, 2004. 
• [7] Hamid Al-Hamadi, Ing-Ray Chen, “Redundancy Management of Multipath Routing for 
Intrusion Tolerance in Heterogeneous Wireless Sensor Networks” IEEE paper, 2013. 
• [8] P.Swaruba, K.Kumaresan,“Weighted voting based trust management for intrusion tolerance 
in heterogeneous wireless sensor networks.” International Journal of Computer Science and 
Management Research, 2013. 
• [9] Daniel-Ioan Curiac, Constantin Volosencu, Dan Pescaru, Lucian Jurca, Alexa Doboli,“ 
Redundancy and Its Applications in Wireless Sensor Networks: A Survey” WSEAS. 
• [10] B. Rachid , H. Hafid , K. Bouabdellah,“ A distributed approach using redundancy for wireless 
sensor networks reconfiguration” Oran Es-senia. 
• [11] S. Mishra, A. Raj, A. Kayal, V. Choudhary, P. Verma, L. Biswal,“ Study of Cluster Based Routing 
Protocols in Wireless Sensor Networks” IJSER journal .
QUESTIONS?

Contenu connexe

Tendances

GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...ijwmn
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferIJAEMSJORNAL
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor NetworkAarthi Raghavendra
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsnKamal Patel
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocoljaimin_m_raval
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Sigma web solutions pvt. ltd.
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
透视消费者.ppt
透视消费者.ppt透视消费者.ppt
透视消费者.pptwei mingyang
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Enhanced Traffic Based Malicious Switch Detection in SDN
Enhanced Traffic Based Malicious Switch Detection in SDNEnhanced Traffic Based Malicious Switch Detection in SDN
Enhanced Traffic Based Malicious Switch Detection in SDNAkshaya Arunan
 

Tendances (18)

GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data Transfer
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
 
1766 1770
1766 17701766 1770
1766 1770
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsn
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
C0363012014
C0363012014C0363012014
C0363012014
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
透视消费者.ppt
透视消费者.ppt透视消费者.ppt
透视消费者.ppt
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Enhanced Traffic Based Malicious Switch Detection in SDN
Enhanced Traffic Based Malicious Switch Detection in SDNEnhanced Traffic Based Malicious Switch Detection in SDN
Enhanced Traffic Based Malicious Switch Detection in SDN
 

Similaire à Redundancy Management in Heterogeneous Wireless Sensor Networks

Routing protocol for effective interoperability
Routing protocol for effective interoperabilityRouting protocol for effective interoperability
Routing protocol for effective interoperabilityvenkateshphd15
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptDEEPAK948083
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Veltech university.pptx
Veltech university.pptxVeltech university.pptx
Veltech university.pptxsundar602496
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSijwmn
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
 

Similaire à Redundancy Management in Heterogeneous Wireless Sensor Networks (20)

Routing protocol for effective interoperability
Routing protocol for effective interoperabilityRouting protocol for effective interoperability
Routing protocol for effective interoperability
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Sensor.ppt
Sensor.pptSensor.ppt
Sensor.ppt
 
Sensor
SensorSensor
Sensor
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.ppt
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
Veltech university.pptx
Veltech university.pptxVeltech university.pptx
Veltech university.pptx
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 

Dernier

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Dernier (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Redundancy Management in Heterogeneous Wireless Sensor Networks

  • 1. REDUNDANCY MANAGEMENT IN HETEROGENEOUSWIRELESS SENSOR NETWORKS By: Saeid Hossein Pour lotomi Roll No: 12011D4026 Guide: Ms.E.Hemalatha
  • 2. Overview • Introduction • Modules • Screenshots • Conclusion • Future work • References
  • 3. Introduction • WSNs are deployed in an unattended environment. • limited resources, a WSN must satisfy: i. QoS requirements and also ii. minimize energy consumption  to prolong the system useful lifetime. • Tradeoff between energy consumption vs. QoS gain with the goal to maximize the WSN system lifetime has been well explored in the literature. • No prior work exists to consider the tradeoff in the presence of malicious attackers.
  • 4. The components of a sensor node
  • 5. What is Wireless Sensor Networks? • WSN is composed of a large number of wireless sensors with low processing power and energy consumption for monitoring a certain environment • In mathematics, a Voronoi diagram is a way of dividing space into a number of regions.
  • 6. Modules I. Attack Scenario II. Compromised Node III. Redundancy Management IV. Dynamic Redundancy Management Algorithm
  • 7. Attack Scenario • All sensors are subject to capture attacks • Intrusion/fault Tolerance Through multipath routing • Two most energy conserving attacks I. Bad-mouthing attack II. Packet dropping attacks
  • 8. Compromised Node • To detect compromised nodes, every node runs a simple host IDS to assess its neighbors. • The IDS is light-weight to conserve energy. It is also generic and does not rely on the feedback mechanism tied in with a specific routing protocol . • It is based on local monitoring. That is, each node monitors its neighbor nodes only. • To remove malicious nodes from the system, a votingbased distributed IDS is applied periodically in every TIDS (IDS interval time(sec)). • It analyses the network by collecting sufficient amount of data and detects unusual behavior of sensor node.
  • 9. Redundancy Management • Increase source or path redundancy enhance reliability , security. However, it also increases the energy consumption (system lifetime). • Tradeoff between QoS vs. energy consumption by using distributed IDS. • Maximize life time of a HWSN(MTTF)
  • 10. Algorithm for Dynamic Redundancy Management of multipath routing algorithm. The objective of dynamic redundancy management is to dynamically identify and apply the best redundancy level in terms of path redundancy (mp) and source redundancy (ms), as well as the best intrusion detection settings in terms of the number of voters (m) and the intrusion invocation interval (TIDS) to maximize MTTF.
  • 11. CH Execution for Dynamic Redundancy Management. 1: CH Execution: 2: Get next event 3: if event is TD timer then 4: determine radio range to maintain CH connectivity 5: determine optimal TIDS,m,ms,mP 6: notify SNS within the cluster of the new optimal settings of TIDS and m 7: else if event is query arrival then 8: trigger multipath routing using mS and mP 9: else if event is Tclustering timer then 10: perform clustering 11: else if event is TIDS timer then 12: for each neighbor CH 13: if selected as a voter then 14: execute voting based intrusion detection 15: else // event is data packet arrival 16: follow multipath routing protocol design to route the data packet
  • 12. SN Execution for Dynamic Redundancy Management 1: SN Execution: 2: Get next event 3: if event is TD timer then 4: determine radio range to maintain CH connectivity within a cluster 5: else if event is control packet arrival from CH then 6: change the optimal settings of TIDS and m 7: else if event is Tclustering timer then 8: perform clustering 9: else if event is TIDS timer then 10: for each neighbor SN 11: if selected as a voter then 12: execute voting based intrusion detection 13: else // event is data packet arrival 14: follow multipath routing protocol design to route the data packet
  • 21. Conclusion • A HWSN is maximized for reliability, timeliness and security requirements of query processing applications in the presence of unreliable wireless communication and malicious nodes. • The design of a dynamic redundancy management algorithm to identify and apply the best design parameter settings at runtime in response to prolong the system lifetime. HWSN utilize multipath routing, used to minimize the energy consumption and reduce the failure node and transfer the information in security manner.
  • 22. Future work For future work, we can explore more extensive malicious attacks in addition to packet dropping and bad mouthing attacks, each with different implications to energy, security and reliability, and investigate intrusion detection and multipath routing based tolerance protocols to react to these attacks.
  • 23. References • [1] Azzedine Boukerche, “Algorithms and protocols for wireless sensor networks” Willey, 2009. • [2] W.Dargie,Ch.poellabauer,“Fundamentals of wireless sensor networks” Willey, 2010. • [3] Ian F.Akylidiz, M. Can Vruan“Wireless sensor networks” Willey, 2010. • [4] Ankita Joshi, Lakshmi Priya “A Survey of Hierarchical Routing Protocols in Wireless Sensor Network” NIT Hamirpur. • [5] Kinjal Patel, Himanshu Arora, Pradeep Jha “Hierarchical routing protocol in wireless sensor network” IJATER. • [6] Fiach Reid, “Network Programming in .NET” Elsevier Digital Press, 2004. • [7] Hamid Al-Hamadi, Ing-Ray Chen, “Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks” IEEE paper, 2013. • [8] P.Swaruba, K.Kumaresan,“Weighted voting based trust management for intrusion tolerance in heterogeneous wireless sensor networks.” International Journal of Computer Science and Management Research, 2013. • [9] Daniel-Ioan Curiac, Constantin Volosencu, Dan Pescaru, Lucian Jurca, Alexa Doboli,“ Redundancy and Its Applications in Wireless Sensor Networks: A Survey” WSEAS. • [10] B. Rachid , H. Hafid , K. Bouabdellah,“ A distributed approach using redundancy for wireless sensor networks reconfiguration” Oran Es-senia. • [11] S. Mishra, A. Raj, A. Kayal, V. Choudhary, P. Verma, L. Biswal,“ Study of Cluster Based Routing Protocols in Wireless Sensor Networks” IJSER journal .

Notes de l'éditeur

  1. Coordinated colors Pay particular attention to the graphs, charts, and text boxes. Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale. Graphics, tables, and graphs Keep it simple: If possible, use consistent, non-distracting styles and colors. Label all graphs and tables.
  2. This is another option for an Overview slides using transitions.
  3. Microsoft Confidential