Presentation is loading. Please wait.

Presentation is loading. Please wait.

Intrusion Detection-An Energy Efficient Approach In Heterogeneous WSN Department Of Computer Science and Engineering ADARSH COLLEGE OF ENGINEERING CHEBROLU.

Similar presentations


Presentation on theme: "Intrusion Detection-An Energy Efficient Approach In Heterogeneous WSN Department Of Computer Science and Engineering ADARSH COLLEGE OF ENGINEERING CHEBROLU."— Presentation transcript:

1 Intrusion Detection-An Energy Efficient Approach In Heterogeneous WSN Department Of Computer Science and Engineering ADARSH COLLEGE OF ENGINEERING CHEBROLU (Affiliated to J.N.T.U., Kakinada) 08HN1A0534M. SRAVANI 08HN1A0537M. SUSHMA DEVI 08HN1A0516G. RAMYA 08HN1A0524K. SRI SARIKA UNDER THE GUIDANCE OF Mr. T. RAMANJANEYULU

2  Intrusion detection plays an important role in the area of security in WSN.  WSN consumes a lot of energy to detect an intruder. Therefore we derive an algorithm for energy efficient external and internal intrusion detection.

3  Intrusion detection is defined as the art of detecting inappropriate, inaccurate, or anomalous activity.  Today, intrusion detection is one of the high priority and challenging tasks for network administrators and security professionals.

4  A Wireless Sensor Network (WSN) is a collection of spatially deployed wireless sensors by which to monitor various changes of environmental conditions (e.g., forest fire, air pollutant concentration, and object moving) in a collaborative manner without relying on any underlying infrastructure support.

5  In a WSN, there are two ways to detect an object (i.e., an intruder): ◦ single-sensing detection ◦ multiple-sensing detection  In the single-sensing detection, the intruder can be successfully detected by a single sensor.  On the contrary, in the multiple-sensing detection, the intruder can only be detected by multiple collaborating sensors.

6  An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer mainly through a network, such as the Internet.

7 IDS Components SensorsConsoleEngine

8  The intrusion distance is referred as D and defined as the distance between the points the intruder enters the WSN, and the point the intruder is detected by the WSN system.  The value of D must be minimum.  D=Distance b/w the point at which intruder enters WSN and the point at which intruder is detected.

9 Existing System  In single-sensing detection, at a time only one intruder detected by the WSN.  Our Previous work was according to homogeneous and heterogeneous single sensor in wireless sensor network. Proposed System  In Heterogeneous wireless sensor, Intruder detected anywhere in the network.  We are detecting the intruder in multiple sensor heterogeneous wireless sensor networks.

10 Rec1 Source Detector Data Flow Rec 3 Rec 2 Intruder Heterogeneous single sensor

11 S2 Detec2 Detec3 B C S1 Detec1A Data Flow Intruder

12

13 HARDWARE  Processor: Pentium IV 2.6 GHz  RAM: 512 Mb  Hard Disk: 20 Gb SOFTWARE  Front End: Java  Tool Used: JFrameBuilder  Operating System: Window’s Xp

14  Constructing Network Security  Randomized Field Detection  Layered Approach For Intrusion Detection  Find Authorized And Unauthorized Port  Constructing Inter-domain Packet Filters  Receiving The Valid Packet

15 CONSTRUCTING NETWORK SECURITY  In this module, we are going to connect the network, each node is connected to the neighbouring node and it is independently deployed in network area.  And also deploy the each port no that is authorized in a node. RANDOMIZED FIELD DETECTION  In this module, browse and select the source file.  And selected data is converted into fixed size of packets.  And the packet is send from source to detector.

16 LAYERED APPROACH FOR INTRUSION DETECTION  The LIDS draws its motivation from what we call as the Airport Security model, where a number of security checks are performed one after the other in a sequence.  Similar to this model, the LIDS represents a sequential Layered Approach and is based on ensuring availability, confidentiality, and integrity of data and (or) services over a network.

17 FIND AUTHORIZED AND UNAUTHORIZED PORT  If path is authorized the packet is send to valid destination.  Otherwise the packet will be deleted. CONSTRUCTING INTER-DOMAIN PACKET FILTERS  If the packet is received from other than the port no it will be filtered and discarded.  This filter only removes the unauthorized packets and authorized packets send to destination.

18 RECEIVING THE VALID PACKET  In this module, after filtering the invalid packets, all the valid Packets will reach the destination.

19 File Dialog Select The Source File Fixed Size of Packet Detector Source

20

21 Use-case Diagram:

22 Sequence Diagram For Module1

23 Sequence Diagram For Module2

24 Sequence Diagram For Module3

25 Sequence Diagram for Module4

26 Activity Diagram For Module1

27 Activity Diagram For Module2

28 Activity Diagram For Module3

29 Activity Diagram for Module4

30  We have developed an analytical model for intrusion detection and applied the same into single-sensing detection and multiple sensing detection scenarios for heterogeneous WSNs..

31 THANK YOU…

32 ANY SUGGESTIONS???


Download ppt "Intrusion Detection-An Energy Efficient Approach In Heterogeneous WSN Department Of Computer Science and Engineering ADARSH COLLEGE OF ENGINEERING CHEBROLU."

Similar presentations


Ads by Google