Model Based Analysis for QoS Guarantee by Intrusion Detection System in Heterogeneous Wireless Sensor Networks

Full Text Download |
Abstract
In this paper we propose a model based analysis to
provide QoS Guarantee by using the Intrusion Detection
System(IDS) in Heterogeneous wireless sensor
networks(HWSN).The key concept of our model based
analysis is to provide a multipath routing with redundancy
management in which the query response probability is
maximized and to increase the lifetime of network. In HWSN
a voting based intrusion detection algorithm is used to
overcome the trade-off problem between energy consumption
vs gain in QoS parameters. The Maximization of lifetime of
network is achieved by using the dynamic redundancy
algorithm which is used in fault tolerant control.
Keywords:Redundancy management, Intrusion Detection
System, QoS parameters.
INTRODUCTION
The objective of dynamic redundancy management is to
dynamically identify and apply the best redundancy level in
terms of path redundancy and source redundancy, as well as
the best intrusion detection settings in terms of the number of
voters to maximize Mean time to Failure (MTTF), in
response it tends to environment changes of source/cluster
head node density, radio range and capture rate. Numerous
wireless sensor networks (WSN) are deployed in an
unsupervised environment in which the energy replenishment
is very difficult to maintain. Due to lack of resources the
WSN cannot fulfill the QoS requirements such as reliability,
timeliness and security and it also satisfy the energy
consumption to increase the lifetime of HWSN. The
“Clustering” is used to satisfy the above requirements. A
cluster combines the resources of two (or) more computing
devices together. Clustering improves the system’s
availability to user and aggregates to overall tolerance to
fault, component failures. Our study explains the
performance of heterogeneous WSN is much more better
than the homogeneous WSN. The presence of malicious
nodes in the path will break the path so that the trade-off
between energy consumption vs QoS gain will get more
complicated in both homogenous and heterogeneous WSN. In
particular heterogeneous WSN the Cluster heads (CH) may
get affected in the data delivery. In this case we use Intrusion
Detection System (IDS),which is used to detect and evict the
presence of malicious nodes. The model based analysis which
is represented as a single term but it defines the redundancy
management and the type of routing which is used. In this paper we use the multipath routing which is a best
method of routing in this the fault tolerance and data delivery
is much improved. Even though the multipath routing is
tolerant of fault but by the recent studies tells that the tradeoff
issue will reduce the lifetime of the WSN. In the presence
of unreliable and malicious nodes the redundancy is routed
through a sink node, this is considered to maximize the
lifetime of network and is attained by query success
probability. This is considered as optimization problem and
the voting based intrusion detection algorithm which is used
to remove the unreliable nodes.
In this paper the model based analysis is introduced in
which the multipath redundancy level and intrusion detection
setting are used to satisfy the QoS requirements and to
maximize the lifetime of the HWSN. For the intrusion
tolerance we consider the problem in which the “selection of
paths” and the “number of paths” are considered in which the
“selection of paths” is solved by using light weighted IDS are
used. For “numbers of paths” the paths are chosen depends in
which the lifetime of the network is to be maximized. The
paper is aligned as follows: In the section II, we discuss the
related work which is contrast to our paper and about the
existing work carried before. In the section III, we discuss the
algorithm which is used in this paper. In the section IV the
probability model (i.e.) the expressions in which the capture
rate, query rate, reliability and energy consumption are given.
In the section V, we discuss the conclusion and future
enhancement of this paper.
CONCLUSION
In this paper we performed model based analysis
which had explained the concept of redundancy management
by utilizing multipath routing to answer the user queries. The
method of IDS is used to identify and evict the attack of
malicious nodes. The dynamic redundancy management
algorithm is used to identify the best parameter setting so that
the lifetime of the system is to be maximized.
For Future enhancement we plan to find more
malicious attacks and in addition the packet dropping and bad
mouthing attacks with different implementations to security,
energy and reliability. Another method of “weighted voting”
which is used to know the knowledge of neighbor nodes. For
applications we use trust-based admission control scheme is
used when the query traffic is heavy
References:
- C. Haowen and A. Perrig, “PIKE: peer intermediaries for key establishment in sensor networks,” in Proc. 2005 IEEE Conf. ComputerCommun., pp. 524–535.
- S. Rajasegarar, C. Leckie, and M. Palaniswami, “Anomaly detection in wireless sensor networks,” IEEE Wireless Commun. Mag., vol. 15, no.4, pp. 34–40, 2008.
- Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Commun. Surveys & Tutorials, vol. 10, no. 3, pp. 6–28, 2008. 49–55.
- Y. Lan, L. Lei, and G. Fuxiang, “A multipath secure routing protocol based on malicious node detection,” in Proc. 2009 Chinese ControlDecision Conf., pp. 4323–4328.
- I. Krontiris, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. 2007 European WirelessConf.
- J. H. Cho, I. R. Chen, and P. G. Feng, “Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks,” IEEE Trans. Reliab., vol. 59, no. 1, pp. 231–241, 2010.
- D. Somasundaram and R. Marimuthu, “A multipath reliable routing for detection and isolation of malicious nodes in MANET,” in Proc. 2008Int. Conf. Computing, Commun. Netw., pp. 1–8.2010.
- Y. Yang, C. Zhong, Y. Sun, and J. Yang, “Network coding based reliable disjoint and braided multipath routing for sensor networks,” J. Netw.Comput. Appl., vol. 33, no. 4, pp. 422–432, 2010.
- E. Felemban, L. Chang-Gun, and E. Ekici, “MMSPEED: multipath multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 5, no. 6, pp. 738–754, 2006.
- J. Deng, R. Han, and S. Mishra, “INSENS: intrusiontolerant routing for wireless sensor networks,” Computer Commun., vol. 29, no. 2, pp.216–230, 2006.
- K. D. Kang, K. Liu, and N. Abu-Ghazaleh, “Securing geographic routing in wireless sensor networks,” in Proc. 2006 Cyber Security Conf. Inf.Assurance.
- A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L.B. Ruiz, and H. C. Wong, “Decentralized intrusion detection in wireless sensor networks,” in Proc. 2005 ACM Workshop Quality Service SecurityWireless Mobile Netw.
- W. Lou and Y. Kwon, “H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks,” IEEETrans. Veh. Technol., vol. 55, no. 4, pp. 1320–1330, 2006.
- H. Su and X. Zhang, “Network lifetime optimization for heterogeneous sensor networks with mixed communication modes,” in Proc. 2007 IEEEWireless Commun. Netw. Conf., pp. 3158–3163.