20
Security of WSNs Based on a Trust-Aware Shell Miss. Ketaki Deshmukh (Amrutvahini College of Engineering)

Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Security of WSNs Based on a Trust-Aware Shell

Miss. Ketaki Deshmukh

(Amrutvahini College of Engineering)

Page 2: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Overview

• Introduction

• Existing System

• Proposed System

• Architectural Diagram

• Features

• Application

• Future Scope

• Conclusion

• References

Page 3: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

What is WSN?

• A sensor node wirelessly sends messages to a base station via multi-hop path

Fig: Wireless sensor network

Page 4: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Introduction

• Security of WSNs

• Trust Aware Shell :A robust trust aware routing framework for dynamic

WSNs

provides trustworthy and energy-efficient route

effective against harmful attacks

Page 5: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Existing System

• Hackers aggravate network conditions

• A traditional techniques does not address the severe problems:tampering nodescreate traffic collisiondrop or misdirect messages in routesjam the communication channel by creating radio

interference

Page 6: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Proposed System

• Protect WSNs from the harmful attacks exploiting the replay of routing information

• Centres on trustworthiness and energy efficiency

• Allow existing routing protocols to incorporate our implementation

• No tight time synchronization & known geographic information

Page 7: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Attacks on WSN

Selective forwarding

Wormhole attack

Sinkhole attack

Sybil attack

Page 8: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Wormhole Attack

Sinkhole Attack

Page 9: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Architectural Diagram

Page 10: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Energy Watcher

Neighbor Energy Cost

Neighborhood Table

Fig. Working of Energy Watcher

Page 11: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Energy Watcher

ENb = EN–>b + Eb

ENb: Average Energy Cost.

EN–>b:Average Energy Cost of successfully delivering a data packet from N to its neighbour b.

Eb: Energy Cost for b.

Page 12: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Trust Manager

• Trust manager is to get neighbor trust level from a neighborhood table

Fig: Example To Illustrate Working Of Trust Manager

Page 13: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Secure Routing With Trust Evaluation

Malicious Node

Source node

Destination Node

Source node

Response Node 1

Destination Node

Response Node 2

Source node

Malicious Node

Destination Node

(a)Routing request

(b)Routing response

(c)Data conformation form the destination node

Page 14: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Example

Fig: Trust manager level table

Page 15: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Features

High Throughput

Energy efficient

Scalable

Adaptable

Page 16: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Disadvantages

Low Latency

No Balanced Network Load

Denial-Of-Service Attacks cannot be addressed

Page 17: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Applications

Mobile Target Detection in the Presence of an Anti-Detection Mechanism

Authenticated Routing

Node-to-Node Key Agreement

Secure Military Application

Healthcare Application

Page 18: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Conclusion

Page 19: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

References

• G. Zhan, W. Shi, and J. Deng, “Tarf: A trust-aware routing framework for wireless sensor networks,” in Proceeding of the 7th European Conference on Wireless Sensor Networks (EWSN’12), 2012.

• F. Zhao and L. Guibas, Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann Publishers, 2004.

• C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proceedings of the1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003.

• M. Jain and H. Kandwal, “A survey on complex wormhole attack in wireless ad hoc networks,” in Proceedings of International Con-ference on Advances in Computing, Control, and Telecommunication Technologies (ACT ’09), 28-29 2009

Page 20: Design and implementation of TARF: A Trust Aware Routing Framework for Wireless Sensor Networks

Thank You!