Upload
vinayak-raja
View
962
Download
3
Embed Size (px)
Citation preview
Intrusion Detection in Wireless Sensor Network
Presented ByVinayak Raja(060)
Sachin Sharma(020)Manvika Singh(031)
Wireless Sensor NetworkA wireless sensor network (WSN) consists of
distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure,
WSN is built of nodes.Each sensor node has following parts Radio Transceiver Microcontroller Energy Source(battery)
ApplictationsArea monitoringEnvironmental/Earth monitoringIndustrial monitoringWater/Waste water monitoring
Intrusion detection system (IDS) An intrusion detection system (IDS) is a device
or software application that monitors network or system activities for malicious activities policy violations and produces reports to a management station.
IDS typically record information related to observed events, notify security administrators of important observed events and produce reports
Proposed SystemDetection Model
The detection model defines how the intruder can be detected.
Two detection models : single-sensing detection model multiple-sensing detection model
Single Sensor NetworkIn single-sensing detection, the intruder can
be successfully detected by a single sensorPrevious work was according to
homogeneous single sensor in wireless sensor network
It is because individual sensors can only sense a portion of the intruder.Rec1
Source
Detector
Filter
Rec 3
Rec 2
Disadvantages The sensed information provided by a single
sensor might be inadequate for recognizing the intruder.
So that there is no guarantee for our information has been sent securely.
Data will not routed if primary detector fails.
Multiple Sensor NetworkIn multiple-sensing detection, the intruder
can be successfully detected by a single sensor
It is because individual sensors can only sense a portion of the intruder.
Data Flow
•Sending packet from source S to D
S2
Detec2
Detec3
B
C
S1
Detec1 A
•Intruder
ModulesConstruction of Sensor NetworkPacket CreationAuthorization of portsConstruction of Packet Filters
Construction of Sensor Network In this module, we are going to connect the
network.Each node is connected the neighboring node
and it is independently deployed in network area.
We give a port no to each node in network.Rec1
Source
Detector
Filter
Rec 3
Rec 2
Packet CreationIn this module, we select the source file. And
selected data is converted into fixed size of packets. And the packet is send from source to detector.
Authorization of portsIn this module we check whether the path is
authorized or unauthorized.According to port no only we are going to
find the path is authorized or Unauthorized. If path is authorized the packet is send to
valid destination. Otherwise the packet will be deleted.
Construction of Packet FiltersIf the packet is received from other ports it
will be filtered and discarded. This filter only removes the unauthorized packets and send authorized packets to destination.