Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: LABEL-BASED DV-HOP LOCALIZATION AGAINST WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
LABEL-BASED DV-HOP LOCALIZATION AGAINST WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS

[attachment=32870]

Introduction

With the advantages of low cost, large scale, densely distributed deployment, self-configuration, etc., wireless sensor networks (WSNs) have been applied in many fields to monitor and control the physical world. In WSNs, sensed data make no sense without the nodes’ position information. Hence, nodes are required to locate themselves in many WSN applications, such as environment monitoring, emergency rescue, and battlefield surveillance, to name a few. Many protocols and algorithms are designed to solve the node’s positioning problem, which are categorized into two categories: range-based and range-free. Range based protocols calculate the location using the point-to point distance (or angle) estimates. Though range-based schemes are able to obtain relatively accurate results, they can be applied only when nodes are equipped with sophisticated hardware. Range-free solutions do not rely on the availability of range (or angle) estimates, so they need no expensive hardware. Considering that the hardware requirement of range-based solutions is inappropriate for resource-constrained WSNs, researchers are pursuing range-free localization techniques as a cost-effective alternative.

Background and Related Work

This Chapter describes relevant background knowledge and related work for readers to easily understand the analysis conducted in our experiments to be presented.

Literature Survey

Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength. Once these things r satisfied, ten next steps is to determine which operating system and language can be used for developing the tool. Once the programmers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration r taken into account for developing the proposed system.

Existing System

Existing system the wormhole attack can disturb the first two phases of the DV-Hop localization. In the first phase, a sensor may obtain smaller hop-counts to beacons. In the second phase, a beacon may calculate an incorrect hop-size, which is delivered to its neighboring sensors. Finally, each sensor may use incorrect hop-counts and hop-size to estimate the distances to all the beacons for the self-localization.

Proposed System

As sensors networks usually work in a hostile environment, they are vulnerable to various malicious attacks. The wormhole attack, as a typical external attack, can be easily launched by two colluding attackers without the system’s authorization. When such attack is initiated, one attacker tunnels its received packets to another attacker, thus, packets can be delivered through a shorter path. The wormhole attack can deteriorate the DV-Hop localization dramatically. It not only reduces the hop-counts to all the beacons in the network, but also contaminates the average distance per hop. As a result, the location estimate will be far away from precision.
In this project, we focus on defending against the wormhole attack in the DV-Hop localization process, i.e., overcoming the impacts of the wormhole attack on the DV-Hop localization. We propose a label-based secure localization scheme which is wormhole attack resistant based on the DV-Hop localization process. The main idea of our scheme is to generate a pseudo neighbour list for each beacon node, use all pseudo neighbour lists received from neighbouring beacon nodes to classify all attacked nodes into different groups, and then label all neighbouring nodes (including beacons and sensors). According to the labels of neighbouring nodes, each node prohibits the communications with its pseudo neighbours, which are attacked by the wormhole attack.

FeasibilityStudy

The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential.


Overview of the Project

As sensors networks usually work in a hostile environ- ment, they are vulnerable to various malicious attacks. The wormhole attack, as a typical external attack, can be easily launched by two colluding attackers without the system’s authorization. When such attack is initiated, one attacker tunnels its received packets to another attacker, thus, packets can be delivered through a shorter path.. It not only reduces the hop-counts to all the beacons in the network, but also contaminates the average distance per hop. As a result, the location estimate will be far away from precision.
In this paper, we focus on defending against the wormhole attack in the DV-Hop localization process, i.e., overcoming the impacts of the wormhole attack on the DV-Hop localization. The main idea of our scheme is to generate a pseudo neighbor list for each beacon node, use all pseudo neighbor lists received from neighboring beacon nodes to classify all attacked nodes into different groups, and then label all neighboring nodes (including beacons and sensors). According to the labels of neighboring nodes, each node prohibits the communications with its pseudo neighbors, which are attacked by the wormhole attack

High Level Design

The highest level solution design should briefly describe all platforms, systems, products, services and processes that it depends upon and include any important changes that need to be made to them. A high-level design document will usually include a high-level architecture diagram depicting the components, interfaces and networks that need to be further specified or developed. The document may also depict or otherwise refer to work flows and/or data flows between component systems. In addition, there should be brief consideration of all significant commercial, legal, environmental, security, safety and technical risks, issues and assumptions. This includes the followings