You are on page 1of 29

BY P.

SHEETHAL 09321F0050

ABSTRACT
Intrusion detection plays an important role in the area of

security in WSN (wireless sensor n/w). Detection of any type of intruder is essential in case of WSN.
WSN consumes a lot of energy to detect an intruder. Therefore

we derive an algorithm for energy efficient external and

internal intrusion detection. This paper considers single sensing


and multi sensing intruder detection models.

SYSTEM ANALYSIS

EXISTING SYSTEM
single-sensing detection, the intruder can be successfully

detected by a single sensor Previous work was according to homogeneous single sensor in wireless sensor network
It is because individual sensors can only sense a portion of the

intruder.

PROPOSED SYSTEM
Intrusion detection in heterogeneous WSNs by characterizing

intrusion detection with respect to the network parameters.

Two detection models are:


Single-sensing detection Multiple-sensing detection models
These are two detection models

We are detecting the intruder both single sensor and multiple sensor heterogeneous wireless sensor network.

MODULES
Constructing Sensor Network
Packet Creation Find authorized and un authorized port Constructing Inter-Domain Packet Filters Receiving the valid packet

HARDWARE REQUIREMENTS
PROCESSOR
RAM MONITOR HARD DISK CDDRIVE

:
: : : :

PENTIUM IV 2.6 GHz


512 MB DD RAM 15 COLOR 20 GB LG 52X

KEYBOARD
MOUSE

:
:

STANDARD 102 KEYS


3 BUTTONS

SOFTWARE REQUIREMENTS
FRONT END
TOOL USED OPERATING SYSTEM

: Java
: Jframe Builder : Windows Xp

SYSTEM DESIGN

DATA FLOW DIAGRAMS Homogeneous WSN


Rec1 Rec 3

Detector

Rec 2 Source

Filter

Heterogeneous WSN
Detec1 S1 A

Detec2

S2

Detec3

Data Flow
C

Sending packet from source S to D

Intruder

UML Diagrams
USECASE DIAGRAM

select a file

sender select the receiver reveiver.

check for the intrudor Detector.

send the file

CLASS DIAGRAM

SEQUENCE DIAGRAM
sender detector Receiver

select a file

send the file to the selected reciever

check for the intruder

file is send

COLLABORATION DIAGRAM
1: select a file 3: check for the intruder

2: send the file to the selected reciever sender detector

4: file is send

Receiver

ACTIVITY DIAGRAM
source

select a file

select a receiver

detector

Intrusion Detect Receiver If Intrusion is not Detected

SRS

SDLC

Output Screens

Source

Detector

Receiver

packet sending from source to detector

intruder has been detected

Packet sending from source to receiver1

Packet sending from source to receiver2

Packet sending from source to receiver3

single sensing detection

CONCLUSION
This Project speaks about the minimization of external

intrusion detection in an energy efficient way and probability of intrusion detection in a heterogeneous WSN deployed in a two dimensional space. This probability gives an insight in to the required number of sensors in a given deployment, their sensing and transmission range to efficiently detect an intruder in a given WSN. We have developed an analytical model for intrusion detection and applied the same into single-sensing detection and multisensing detection scenarios for heterogeneous WSNs. The correctness of analytical model is proved by simulation.

THANK YOU
Any Query?

You might also like