Routing Protocol for Wireless Sensor Network in Hostile Environments

Embed Size (px)

DESCRIPTION

Routing Protocol for Wireless Sensor Network in Hostile Environments. PhD Student : Kashif Saghar Supervisors: William Henderson David Kendall. Outline. Wireless Sensor Networks (WSN) and Routing Formal Modelling Challenges & Security Issues in WSN Research Aim Research Method - PowerPoint PPT Presentation

Text of Routing Protocol for Wireless Sensor Network in Hostile Environments

  • Routing Protocol for Wireless Sensor Network in Hostile EnvironmentsPhD Student : Kashif SagharSupervisors:William HendersonDavid Kendall

  • OutlineWireless Sensor Networks (WSN) and RoutingFormal ModellingChallenges & Security Issues in WSNResearch AimResearch MethodProgress

  • WIRELESS SENSOR NETWORK (WSN)

  • WSN COMMUNICATION ARCHITECTURERouting

    Data Link (MAC) Layer

    Network Layer

    Transport Layer

    Application Layer

    Physical Layer

  • WHY WSN ARE DIFFERENT?Fault ToleranceScalabilityDensityHardware ConstraintsCostPower ConsumptionWSN Topology

  • ROUTING IN WSNCostEnergy-efficiencyLatencyMobilityDistribution densityScalabilityQuality of Service (QoS)

  • SECURITY ISSUES IN WSNBroadcast NatureLimited ResourcesUnattendedHostile Environment

  • AIM AND OBJECTIVESAIM/Purpose"Attacks on Wireless Sensor Networks, having limited resources, can be successfully resisted at the Network Layer."Primary AssumptionsConfidentiality and Authentication Scheme is present at Link LayerSink is a highly resourced nodeNodes do not have any special hardwareThe approximate time to compromise a node is known in advanceNodes can be placed by any means (Random, Regular)Attacker is very Powerful

  • WSN ATTACKS CONSIDERED

    WormholeTwo colluding nodesA node at one end of the wormhole advertises high quality link to the base stationAnother node at the other end receives the attracted packetsTwo Laptops or Normal NodesBlack hole Selective ForwardingFail Encryption or via WormholeSink holeNode attract all traffic around by making itself attractive to all nodes with in range e.g. LaptopFail Encryption or via WormholeInsider AttackGet into network by node compromise or false node

  • LIST OF SOME WSN ATTACKSSpoofingFalse Injection or Path-base Denial of ServiceBlack hole or Selective forwardingSinkhole attacksSybil attacksWormholesJammingEavesdroppingTraffic Analysis AttackInsider Attack (Compromised Node)False Node and malicious dataRushing AttackStealthy AttackHello Flood Attack

  • LITERATURE REVIEW ANALYSIS

    Chart6

    0.6930693069

    0.1485148515

    0.0346534653

    0.0247524752

    0.0594059406

    0.0396039604

    Scheme Used

    Percentage

    Category

    202

    Cryptographic Techniques69%140

    Multiple-path Protocols15%30

    Overhear Neighbour3%7

    Topology Mapping2%5

    Specialized Hardware6%12

    Reward Protocols4%8

    Category

    0

    0

    0

    0

    0

    0

    Scheme Used

    Percentage

    Attacks

    247

    Spoofing45.3%112

    False Injection6.1%15

    Black hole4.0%10

    Sinkhole attacks3.2%8

    Sybil attacks4.9%12

    Wormhole attack5.3%13

    Jamming20.6%51

    Traffic analysis Attack5.3%13

    Rushing Attack2.4%6

    Stealthy Attack0.4%1

    Hello Flood Attack1.6%4

    Insider Attack0.8%2

    Attacks

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    Simulation Old(o)_

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    old Setup

    41.81.8

    944

    167.36.2

    259.58.4

    5015

    10020.5

    20028.2

    41.81.8

    10019.420.5

    20028.230.4

    2503232.6

    3003739.2

    35039.241.4

    40041.442.5

    50045.848

    75056.857.9

    100067.872.2

    Modified Protcol

    413

    924.5

    1635.5

    2547

    5068.1

    100910.1

    2001314.1

    3001617.1

    4001920

    5002122.5

    7502627.1

    10003132.1

    Modified Protcol

    410.6

    921.3

    1631.6

    2542.6

    5063.3

    10094.8

    200136.8

    300168.9

    4001910.1

    5002111.1

    7502613.8

    10003116.5

    old Setup

    00

    00

    00

    00

    00

    00

    00

    Mayher Model

    NoNoise Model

    No of Nodes

    Time (Seconds)

    Setup Time for Network

    Data

    00

    00

    00

    00

    00

    00

    00

    00

    00

    00

    Best Case

    Worst Case

    No of Nodes

    Time (Seconds)

    Setup Time for Network

    Beacons

    00

    00

    00

    00

    00

    00

    00

    00

    00

    00

    00

    00

    Best Case

    Worst Case

    No of Nodes

    Time (Seconds)

    Setup Time for Network

    SetUp(1)

    00

    00

    00

    00

    00

    00

    00

    00

    00

    00

    00

    00

    100m Range

    200m Range

    No of Nodes

    Time (Seconds)

    Setup Time for Network

    SetUp(10)

    Scalability

    4137

    5068.112

    10091615

    2001314.119

    3001617.122

    4001921.525

    5002122.527

    6002326.629

    7002530.531

    8002728.533

    9002929.635

    10003132.137

    Density

    100910.1

    1505.66.3

    2004.86.6

    2503.85

    30045

    3504.24.9

    4005.16

    4505.16.1

    5005.78.1

    SetUp(10)

    Mayher Model

    NoNoise Model

    No of Nodes

    Time (Seconds)

    Setup Time for Network

    No of Attacks

    Best Case

    Worst Case

    No of Nodes

    Time (Seconds)

    Setup Time for Network

    00

    00

    00

    00

    00

    00

    00

    00

    00

    00

    00

    00

    Best Case

    Worst Case

    Number of Nodes

    Time (Seconds)

    Effect of Scalability on Setup Time

    00

    00

    00

    00

    00

    00

    00

    00

    00

    Best Case

    Worst Case

    Range (m)

    Time (Seconds)

    Effect of Density on Setup Time

    ASKASSIGNLOUD

    Max511754

    Average4.16.92.32.12.0

    Min23022

    HERE

    BEACONS DURING SETUP PHASE

    Total Time = 0:14) (Nodes with incorrect Level = 0

    ------------------------------------------------------------------

    NodeID Ask Assign Loud Final Loud

    ------------------------------------------------------------------

    4Node 13222-- Extra Louds --

    4Node 23222-- Extra Louds --

    4Node 33222-- Extra Louds --

    4Node 43222-- Extra Louds --

    4Node 54122-- Extra Louds --

    4Node 64122-- Extra Louds --

    4Node 74422-- Extra Louds --

    4Node 83222-- Extra Louds --

    4Node 94222-- Extra Louds --

    4Node 104222-- Extra Louds --

    4Node 115322-- Extra Louds --

    4Node 126222-- Extra Louds --

    4Node 135222-- Extra Louds --

    4Node 144222-- Extra Louds --

    4Node 154222-- Extra Louds --

    4Node 164222-- Extra Louds --

    4Node 175322-- Extra Louds --

    4Node 186322-- Extra Louds --

    9Node 197454-- Extra Louds --

    5Node 208032-- Extra Louds --

    4Node 216222-- Extra Louds --

    4Node 225222-- Extra Louds --

    4Node 235222-- Extra Louds --

    4Node 244222-- Extra Louds --

    4Node 255222-- Extra Louds --

    4Node 265222-- Extra Louds --

    4Node 276222-- Extra Louds --

    4Node 286722-- Extra Louds --

    4Node 297622-- Extra Louds --

    4Node 307222-- Extra Louds --

    4Node 317522-- Extra Louds --

    4Node 326222-- Extra Louds --

    4Node 336522-- Extra Louds --

    5Node 346032-- Extra Louds --

    4Node 355422-- Extra Louds --

    4Node 365222-- Extra Louds --

    4Node 376322-- Extra Louds --

    4Node 386422-- Extra Louds --

    4Node 397222-- Extra Louds --

    4Node 407222-- Extra Louds --

    4Node 418322-- Extra Louds --

    4Node 428222-- Extra Louds --

    4Node 438322-- Extra Louds --

    4Node 447222-- Extra Louds --

    4Node 457422-- Extra Louds --

    4Node 466322-- Extra Louds --

    4Node 476422-- Extra Louds --

    4Node 485222-- Extra Louds --

    4Node 496222-- Extra Louds --

    4Node 506222-- Extra Louds --

    4Node 517422-- Extra Louds --

    4Node 527222-- Extra Louds --

    4Node 538322-- Extra Louds --

    4Node 548222-- Extra Louds --

    4Node 559422-- Extra Louds --

    4Node 5610022-- Extra Louds --

    4Node 579422-- Extra Louds --

    4Node 588322-- Extra Louds --

    4Node 599322-- Extra Louds --

    4Node 607322-- Extra Louds --

    4Node 617322-- Extra Louds --

    4Node 626222-- Extra Louds --

    4Node 636222-- Extra Louds --

    4Node 646222-- Extra Louds --

    4Node 657422-- Extra Louds --

    4Node 667222-- Extra Louds --

    4Node 678322-- Extra Louds --

    4Node 689022-- Extra Louds --

    4Node 699322-- Extra Louds --

    4Node 709222-- Extra Louds --

    4Node 7110322-- Extra Louds --

    4Node 7210222-- Extra Louds --

    4Node 7310222-- Extra Louds --

    4Node 749222-- Extra Louds --

    4Node 759422-- Extra Louds --

    4Node 768322-- Extra Louds --

    4Node 778322-- Extra Louds --

    4Node 787222-- Extra Louds --

    4Node 797122-- Extra Louds --

    4Node 806222-- Extra Louds --

    4Node 817122-- Extra Louds --

    4Node 827322-- Extra Louds --

    4Node 838122-- Extra Louds --

    4Node 848122-- Extra Louds --

    4Node 859122-- Extra Louds --

    4Node 8610022-- Extra Louds --

    4Node 8710122-- Extra Louds --

    4Node 8811022-- Extra Louds --

    4Node 8911222-- Extra Louds --

    4Node 9011022-- Extra Louds --

    4Node 9111222-- Extra Louds --

    4Node 9210122-- Extra Louds --

    4Node 9310322-- Extra Louds --

    4Node 949122-- Extra Louds --

    4Node 959122-- Extra Louds --

    4Node 968122-- Extra Louds --

    4Node 978222-- Extra Louds --

    4Node 987122-- Extra Louds --

    4Node 997122-- Extra Louds --

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0

    0