23
Intrusion Detection in Wireless Sensor Network Presented By Vinayak Raja(060) Sachin Sharma(020) Manvika Singh(031)

Intrusion detection in wireless sensor network

Embed Size (px)

Citation preview

Intrusion Detection in Wireless Sensor Network

Presented ByVinayak Raja(060)

Sachin Sharma(020)Manvika Singh(031)

Wireless Sensor NetworkA wireless sensor network (WSN) consists of

distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure,

WSN is built of nodes.Each sensor node has following parts Radio Transceiver Microcontroller Energy Source(battery)

ApplictationsArea monitoringEnvironmental/Earth monitoringIndustrial monitoringWater/Waste water monitoring

Intrusion detection system (IDS) An intrusion detection system (IDS) is a device

or software application that monitors network or system activities for malicious activities policy violations and produces reports to a management station.

IDS typically record information related to observed events, notify security administrators of important observed events and produce reports

Proposed SystemDetection Model

The detection model defines how the intruder can be detected.

Two detection models : single-sensing detection model multiple-sensing detection model

Single Sensor NetworkIn single-sensing detection, the intruder can

be successfully detected by a single sensorPrevious work was according to

homogeneous single sensor in wireless sensor network

It is because individual sensors can only sense a portion of the intruder.Rec1

Source

Detector

Filter

Rec 3

Rec 2

Disadvantages The sensed information provided by a single

sensor might be inadequate for recognizing the intruder.

So that there is no guarantee for our information has been sent securely.

Data will not routed if primary detector fails.

Multiple Sensor NetworkIn multiple-sensing detection, the intruder

can be successfully detected by a single sensor

It is because individual sensors can only sense a portion of the intruder.

Data Flow

•Sending packet from source S to D

S2

Detec2

Detec3

B

C

S1

Detec1 A

•Intruder

ModulesConstruction of Sensor NetworkPacket CreationAuthorization of portsConstruction of Packet Filters

Construction of Sensor Network In this module, we are going to connect the

network.Each node is connected the neighboring node

and it is independently deployed in network area.

We give a port no to each node in network.Rec1

Source

Detector

Filter

Rec 3

Rec 2

Packet CreationIn this module, we select the source file. And

selected data is converted into fixed size of packets. And the packet is send from source to detector.

Authorization of portsIn this module we check whether the path is

authorized or unauthorized.According to port no only we are going to

find the path is authorized or Unauthorized. If path is authorized the packet is send to

valid destination. Otherwise the packet will be deleted.

Construction of Packet FiltersIf the packet is received from other ports it

will be filtered and discarded. This filter only removes the unauthorized packets and send authorized packets to destination.

Multiple Intrusion Detection

THANK YOU