31-10-2012, 05:57 PM
various types of malicious behavior and actions
various types of malicious behavior .docx (Size: 108.08 KB / Downloads: 38)
INTRODUCTION
1.1 GENERAL
We describe various types of malicious behavior and actions that can be carried out by an adversary to attack a wireless sensor network by exploiting the TMP being used in the network. We describe three types of attacks that can be launched against these protocols: sleep deprivation attacks that increase the energy expenditure of sensor nodes, and thus, reduce the lifetime of the sensor network; snooze attacks that result in inadequate sensing coverage or network connectivity; and network substitution attacks in which multiple attackers collude to take control of part of the sensor network.
We describe three attacks against these protocols that may be used to reduce the lifetime of the sensor network, or to degrade the functionality of the sensor application by reducing the network connectivity and sensing coverage that can be achieved. Further, we describe countermeasures that can be taken to increase the robustness of the protocols and make them resilient to such attacks. Using these requirements the Securing topology protocol is used for making well secured network creation. Using securing topology protocol can develop a network which is more secured for client server activity, to analysis the product quantity, quality; manufacturing for that specific Application is more useful for network creation.
1.2. OBJECTIVE
We describe countermeasures that can be taken to increase the robustness of the protocols and make them resilient to such attacks.We found that all these protocols require incorporation of protocol-specific measures in order to increase their resilience to insider attacks.To the best of our knowledge, the only other research work that has pointed out the security issues on topology maintenance protocols.That increases the energy expenditure of sensor nodes, and thus, reduces the lifetime of the sensor network; snooze attacks that result in inadequate sensing coverage or network connectivity; and network substitution attacks in which multiple attackers collude to take control of part of the sensor network.
We may classify the attacker, as in, into various categories based on both its hardware capabilities and its knowledge of the cryptographic keys that are used to provide authenticated and/or confidential communication. The use of topology maintenance protocols introduces new vulnerabilities in sensor networks. In particular, an adversary can launch new kinds of attacks by exploiting the ability of these protocols to increase or decrease the number of active nodes.
The purpose of testing is to discover errors. Testing is the process of trying to discover every conceivable fault or weakness in a work product. It provides a way to check the functionality of components, sub assemblies, assemblies and/or a finished product It is the process of exercising software with the intent of ensuring that the Software system meets its requirements and user expectations and does not fail in an unacceptable manner. There are various types of test. Each test type addresses a specific testing requirement.
This paper reports on an architecture for supporting Securing topology protocol that was designed with both pedagogical and software engineering principles in mind, and a first evaluation. The overall aim of the paper is to demonstrate how our system, called secured network communication effectively prevent networks from malicious attacks. This attacks may be from inside the network or from the outside the network. Our analysis of the security of topology maintenance protocols highlights the need for key management protocols that are resilient to node cloning and replication attacks. Lastly, we show that efficient mechanisms for local (one hop) broadcast authentication are also desirable
REQUIREMENTS ENGINEERING
GENERAL STUDY
EXISTING SYSTEM
In exiting system, various topology maintenance protocols that have been proposed in the literature differ in their objectives as well as in the approaches that are used to achieve their objectives. For example, SPAN and ASCENT attempt to maintain network connectivity, but do not guarantee sensing coverage.All these protocols involve some form of coordination and message exchange between neighboring nodes in order to elect coordinators and determine sleep schedules.These protocols were designed assuming a no adversarial, trusted environment. Consequently, they are vulnerable to security attacks in which malicious nodes send spoofed or false messages to their neighbors in an effort to defeat the objectives of the protocol.Topology maintenance protocols are critical to the operation of wireless sensor networks.Insider attacks cannot be prevented by authentication mechanisms.
PROPOSED SYSTEM
We propose a metaprotocol (Meta-TMP) to represent the class of topology maintenance protocols. We describe various types of malicious behavior and actions that can be carried out by an adversary to attack a wireless sensor network by exploiting the TMP being used in the network.We describe countermeasures that can be taken to increase the robustness of the protocols and make them resilient to such attacks.The proposed countermeasures include authentication mechanisms that can be used to prevent outsider attacks and certain insider attacks. Efficient mechanisms for local (one hop) broadcast authentication.Well defined TMPs implemented so that a node makes its state transition decisions.
HARDWARE REQUIREMENTS
The hardware requirements may serve as the basis for a contract for the implementation of the system and should therefore be a complete and consistent specification of the whole system. They are used by software engineers as the starting point for the system design. It shows what the systems do and not how it should be implemented.