You are on page 1of 37

Wireless sensor networks

Wireless sensor networks(WSN)


PROJECT GUIDE :

PROJECT MEMBERS :

ABSTRACT
Wireless sensor network is prone to the various kinds of network attacks, thus for the security various security mechanisms are already deployed for such networks. However the sensing is done for the only for the homogeneous sensor networks and single sensing

mechanism. Thus simulation of wireless sensor network is the prime focus of proposed
system with the multi-sensing and heterogeneous networks. Wireless sensor networks are used for the detection and reporting certain events across the remote area. Therefore the most prominent factor of the sensor networks is that the packets keep

circulating towards the collector and the network can be featured as a graph. Our
simulation studies are considering the two simulations models of wireless sensor networks such as heterogeneous and homogeneous WSN as well as the possibility of sensing is derived according to the two sensing models such as single sensing and multi sensing

detection models for the WSN IDS detection. The most important characteristic of
wireless sensor network is that it can be created as a graph that is directed due to the packets that are collected by the data collector.

Introduction
The main aim of this project is to spot the threads in the WSN using a single
sensing & multi sensing intrusion detection system (IDS).The primary goal of this project is to detect maximum number of attacks in the wireless networks and also increase the efficient of these networks. We use multiple sensors to detect the attacks in the wireless sensor networks and if any intruder tries to attack the network these sensors that are scattered in the network detect the presence of the attack and the automatically prevent them from entering the network. The use of the mesh topology is used for

these networks as the sensors are distributed over the network.

The first standard for WANs which is the 802.11 protocol was introduced in 1997,An up gradation to it was done which was 802.11b with rate of data increased and CSMA/CA mechanism for medium access control(MAC). This technology is basically developed for the defense use and is used as a secured network for data transmission .They also use this network for observing the battlefield .This was developed by UCLA and Rockwell Science Center in the year 1996.It was called the Low Power Wireless Integrated Micro sensors (LWIM).It has the capacity to use the low cost CMOS fabrication integrate multiple sensors, controls, electronics interfaces and the communication on a single device. The second generation nodes of the sensor was developed in year 1998 by apply some having a processor board with an Intel strong ARM SA1100 32-bit rooted workstation(1MB SRAM and 4 MB flash memory ),the radio board that supports 100 kbps with adjustable power consumption from 1 to 100 memo power supply board and the sensor board.

The Existing System: In the existing system in the wireless sensor network only single sensing intrusion system is available which is not easily detects the attack on the network. Not having multisensing detection only single sensing detection system for the wireless sensor network. - Previous work was according to homogeneous and heterogeneous single sensor in wireless sensor network. - Only Single sensing detection system for the WSN. - Multi sensing is not supported.

Scope of Research The main aim of the project is to develop an application that will detect and prevent the maximum attacks in the WSN (wireless sensor network). This is most useful when any user is sharing a confidential data through the network. These applications are more used in the defense network system. In these networks the major issue is security of networks and so we implement this network with both single and multi sensing mechanisms so that we can easily detect threats in the network and can prevent them from entering our network. This is a system that is very useful to detect the threats in the network and also providing security and hence bring about increase in efficiency of the working of the networks.

Increase security: Using this multisensing as well as single sensing intrusion detection system helps to secured our network.It will provide security against external attacks. Easy to detect the attacks: In the wireless sensor network with help

of single sensing and multisensing we can easily detects the attacks


on the network, because of multiple sensors scattered into the field.

The main objective of our project is as follows:

To develop an application i.e. a wireless sensor network, making the use of


single and multi sensing intruder detection system. Threat detection in WSN (wireless sensor networks). Develop 2 types of sensor modules based on homogenous and heterogeneous wireless networks. Prevention of attacks in WSN (wireless sensor networks). Analyzing and presenting the performance of the simulation.

Wireless Sensor Network (WSN)


physical environment conditions. In this network every node or sensor having routers and gateways to create WSN system. All the nodes in the network connect through the centralized gateway, its establish connection

between network nodes wirelessly. We can establish long distance and reliable connection with help of routers.
The Wireless sensor network consisting of multiple devices and sensors used to monitors

In this functional diagram shows modular design approach provides a flexible and versatile platform to address the needs of a wide variety of applications. When we want to deploy sensors

in the network field the signal conditioning block can be re programmed or replaced. This
allows wide variety of sensors to be used with the wireless sensing node. As per the given applications requirement radio links may be swapped these applications wireless range

requirement and the need for bidirectional communications. For acquiring data from base station
remote nodes used flash memory. Microprocessor having following functions: Collects the data from the sensors managing this data.

It performs power management functions


It will interface the sensor data to the physical radio layer. It manages the radio network protocol

The Sensor Node


The sensor node is responsible for monitors the physical environment and generate alert about illegal activities to the administrator. Its having sensing algorithm which detect

attacks in the system. In the network field many sensors scattered, every sensor node
having battery power which used to detect attacks. These batteries are rechargeable automatically like solar system. These sensors tiny in size and inexpensive and we can

easily place in the network field. Sensor doesnt have any IP address for identification its
having own identifier which is capable to identifying themselves. When any sensor node lost his battery power this will automatically eliminates from the network.

The Wireless Networking


The wireless sensor network is also depends upon the Wireless networking technology. The 802.11 first standard wireless local area network (WLAN) was introduced in year 1997. Later on it was upgraded by 802.11b with increased data rate CSMA/CA mechanism for medium access control (MAC).For for wireless LAN development and design laptops and PDAs are used. For the wireless sensor network the 802.11 protocol is not suitable. At that time finding solution against this problem applying lots of research introduced new MAC protocol. 802.15.4 Zigbee protocol was developed specially for short data rate and low data rate wireless personal area network. This new protocol applicable in wireless sensor network most of commercial sensor node products like Micaz, Telos etc. In wireless sensor network developing new routing technique for the communication.

The Collaborative signal processing For developing the wireless sensor network the Collaborative signal processing algorithm is used. This is another technology that is used. Lots of data collected by the sensor nodes in the development but when we see that the only the small amount of data that useful here .Hence the data must be filter and the only the useful data is used to get the end user. Then computation is more energy efficient than wireless communication, this helps to save energy which is requires to send large amount raw data. Information fusion is most important for collaborative signal processing. Then it collects the data from the multiple sensors and then checks the noise between nodes. Then it filters collected data and provides accurate and useful information generated by large number of sensor nodes, for generating the accurate information the data collaboration rich set of techniques are used.

The Wearable data acquisition hardware The sink node is also known as the wearable data acquisition hardware, it is responsible for interacting with the sensor nodes. The Sink node is received data from the different sensor nodes, and this data sink node then will processed and transmitted to the remote monitoring station. The hardware of wearable data acquisition is based upon the processor which having a digital signal processing capability. The Antenna, transceiver, processor, flash memory, input unit, display and battery with charging circuit these are the modules of the sink node. The wearable data acquisition hardware having batteries and these batteries are rechargeable and also having battery backup 812 hours time duration.

The Remote monitoring Station From the sink nodes transmitted the physical data to the remote station. In the live network different types of data devices connected to the remote monitoring station for data communication. For Example is monitoring health status of all the soldiers in battle field. The data of the individual wearers are displayed at the remote monitoring station. The Power The Sensor is having limited energy power and other sources that are size and cost constraints. Each sensor having limited power supply and every sensor node having batteries these batteries are rechargeable or can self powered.

The Wireless Sensor network architecture For the WSN feasibility all the applications which is used in the network must be having lower cost, it must use network topology for network establishment. The Access control and securities

for data transportation and less power consuming

The WSN applications

The Structural health monitoring-smart structures The Industrial Automation Application highlight-Civil structure monitoring

Wireless Sensor Network Topologies


For creating the virtual shape and structure of the network the Network topology is used . In the network multiple computers connected to each other using some hardware devices The Star Network (Single point-to-multipoint) In this type of network topology having one base station for data sends and receive to the network nodes. This base station centrally located in the network. Mesh Network topology In Mesh Network topology type of network all the nodes connected each other; it possible to send the data from any node to any node in the network directly. The Hybrid Star-Mesh Network Topology These is the another one topology Hybrid star mesh network provides robust and versatile communication network between the different machines.

The IDS in Wireless Sensor Network


The Wireless Sensor Network (WSN) means one type of network where multiple sensors scattered on the field for monitoring physical or environmental actions in the network. This network technology basically developed for defense network security, now a day this

network used everywhere in organizations, home, offices etc.


use small amount of resources for data checked when data packets send to destination node. It must be assumed that no node will be fully trusted; it must be use some cryptographic

techniques for data transportation. In intrusion detection system we will detect network
detection provide following details: It will monitor activities in the network and analyze the problem. It will detect all vulnerabilities with the help of audit.

It also checks abnormal activities in the network.


It also done operating systems audit. attacks with the help of sensors, these sensors scattered on the network field. Intrusion

In IDS three main components are as follows The Network Intrusion Detection System (NIDS): It performs an analysis for passing traffic on the entire network. It matches the traffic that is passed on the subnets to the library of knows attacks. When attack is found it will send alert to administrator. The Network Node Intrusion Detection System (NNIDS): It observes network traffic which passed by network specific node to host. NNIDS monitors only the single host only it cannot monitors entire network or subnet, this is main difference between NIDS and NNIDS. The Host Intrusion Detection System (HIDS): In this type of intrusion detection system by taking snap shot of the current system files and matches this snap shot with the previous systems snap shot. If in the current snap shot detects any problem about missing any files then it will generate alert and send to administrator.

Wireless sensor network follows four things in the network:

The Confidentiality
In. We must use cryptography mechanisms when we send data in the network wireless sensor network data confidentiality is very important when we send data over the network

The Data Integrity


We used sensor network to monitors environment changes, in wireless sensor network
data integrity is very important, because multiple object moving on the field attackers only see physical environment .

The Service Availability Availability is not concern about data being send in the network, its related to check network availability for data packet sending, or network functionality The Energy (Denial of sleep attack ) For attack detection sensor node requires the battery power, this battery energy is having limited power

The Basics of Homogeneous and Heterogeneous WSN


Homogeneous WSN In homogeneous network all the nodes are identical which is identifying by battery energy and hardware complexity. In homogenous networks having pure static clustering. In homogeneous single network topology is used and this is not complex network

The Heterogeneous WSN


In heterogeneous network more than one and different types of nodes with having different battery functionality is used. In heterogeneous network different topologies are used and

this is very complex network.

Comparison between single sensing and multi sensing


Single sensing The single sensing mechanism does not have the capability to monitor any type of attack in WSN. The security in this network is not assured that it will protect the network from the attacks. The battery backup of these sensors is not satisfactory as compared to the multi sensing sensors. Multi sensing These sensors are able to detect any type of network attacks that occur in WSN. The efficiency of these types of networks is very high as they give the assurity for protecting the network from maximum attacks.

Requirement Analysis
In the research methodology we are discussing the methodologies which we used for the analysis of the intrusion detection system in different homogeneous and the heterogeneous wireless sensor network. In this project we implements single sensing as well as multi sensing methodologies for attack detection The Research Area Thus according to discussions so far, in this thesis our main area of research is the attack detection in wireless sensor network using multi sensing single sensing as well as multi sensing methodologies which includes detects any type of attack in the wireless sensor network and generate alert to the administrator by message sending. In the network so many attackers continuously triggering our network, Proposed Methodologies

The project is based on the mesh topology which is a network topology and is used for network
creation. For the sake of efficiency we use the fully connected mesh topology.

Research Methods used For this research we used qualitative and quantitative research methods for the complete study

over the IDS in WSN. In this section we will discuss over this methods in brief:
Qualitative research: This research methods contains the data analysis like pictures (videos), words (from interviews), or the objects ( artifact). In short, the main aim of using the qualitative research methods of researcher is to get the complete and detailed information about the particular

topic.
Quantitative research: Whereas quantitative research methods contains numerical data analysis. Thus main aim behind using the quantitaitve research is that classifying the features, constructing stastical models, counting them in order to explain what is obsered.

The strengths and weaknesses: Most important strong point regarding quantitative and
qualitative research methods is that they are hot debate, perennial, most importantly in case of social sciences. Whereas the drawback is that it resulted into the paradigm war.

The researcher thinking style or personality and also the organization culture is considered as the
key factor for the proffered methods choice. This methods are mainly concentrating on debate of quantitative vs. qualitative factors that frames methods in opposition.

Research Finding To achieve this type of benefits in current system there is only single sensing which detects only

known attacks and also not having well batteries backup that cause the batteries down in less
time the sensing will not active for more time. This approach is finding basically for the how to detects the all the types of the network threats to maintains the security and the taken proper action against the attacks.

Hardware and Software Requirement For the proposed research, we carry out results on the Windows platform mostly using the Visual Studio 2008. During the all the simulation results are analyzed and collected for the verification of study. The Software requirements Front end: C#.Net Environment: Microsoft visual studio 2008. The Hardware requirements Processor Processor Speed RAM Hard Disk Key Board : : : : : Intel P-IV based system 2.0. GHz 256 MB to 512 MB 40GB to 80GB 104 keys

UML Diagrams

The output window

This is simulation window shown in figure above: on the top of this window there is given configuration parameters which require setting network configuration parameters. In that following parameters are given Network size- using this parameter we set our network size means how many nodes want in our network.

Creation of the network

Here every node is connected to other node in the network due to the mesh topology. The grey circles indicate the nodes of the sensor and their size indicate the sensor detection range

assessment of the presentation

In this network window, we will measure the performance analysis for each scenario using the IDS approach.

: Prevention techniques

This window represents the prevention from the harmful attacks that are sent by the malicious nodes in the network.

Future enhancements and conclusions


The major focus of the application is on the detection and prevention of attacks in wireless sensor networks. For that we have made use of single as well as multi sensing algorithms. The homogenous and heterogeneous networks encounter these types of attacks. For discovery of

these attacks we have implemented a simulation environment so that we can detect them and
prevent them from entering the network. For this purpose we have used the mesh topology which is useful for these types of networks. To reduce the risk of attacks the use of multi sensing algorithms are used. These algorithms

have the ability to detect any type of attack that is encountered in the network. Each sensor
node in the multi sensing network has a battery power which is rechargeable automatically and they are used for attack detection. Whereas in the single sensing systems the power of the batteries are not rechargeable.

If the range of sensor nodes increases the detection decreases. Eventually we conclude that the
multi sensing heterogeneous networks work efficiently than the single sensing networks. As the research proceeds further we will be looking forward to implement the Leach and M-Leach and IDS investigation for the heterogeneous sensor networks.

References and Bibliography


1.] Agah, Das, and Basu, A game theory based approach for security in wireless sensor networks

2.] M. Stahlberg, Radio Jamming attacks against two popular mobile networks, Helsinki University of Tech. Seminar on Network Security, fall 2000.

3.] da Silva, A.P., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., Wong, and H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet 2005), pp. 1623. ACM Press, New York (2005)

4.] Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M.: Intrusion detection of sinkhole attacks in wireless sensor networks. In: Proceedings of the 3rd International Workshop on Algorithmic Aspects of

Wireless Sensor Networks (AlgoSensors 2007), Wroclaw, Poland (July 2007)

5.] A. Kulakov and D. Davcev. Tracking of unusual events in wireless sensor networks based on artificial neural-network algorithms. Information Technology: Coding and Computing (ITCC), 2:534539, 2005.

Thank You

You might also like