SLP Header

Model Based Analysis for QoS Guarantee by Intrusion Detection System in Heterogeneous Wireless Sensor Networks

IJCSEC Front Page

In this paper we propose a model based analysis to provide QoS Guarantee by using the Intrusion Detection System(IDS) in Heterogeneous wireless sensor networks(HWSN).The key concept of our model based analysis is to provide a multipath routing with redundancy management in which the query response probability is maximized and to increase the lifetime of network. In HWSN a voting based intrusion detection algorithm is used to overcome the trade-off problem between energy consumption vs gain in QoS parameters. The Maximization of lifetime of network is achieved by using the dynamic redundancy algorithm which is used in fault tolerant control.
Keywords:Redundancy management, Intrusion Detection System, QoS parameters.
The objective of dynamic redundancy management is to dynamically identify and apply the best redundancy level in terms of path redundancy and source redundancy, as well as the best intrusion detection settings in terms of the number of voters to maximize Mean time to Failure (MTTF), in response it tends to environment changes of source/cluster head node density, radio range and capture rate. Numerous wireless sensor networks (WSN) are deployed in an unsupervised environment in which the energy replenishment is very difficult to maintain. Due to lack of resources the WSN cannot fulfill the QoS requirements such as reliability, timeliness and security and it also satisfy the energy consumption to increase the lifetime of HWSN. The “Clustering” is used to satisfy the above requirements. A cluster combines the resources of two (or) more computing devices together. Clustering improves the system’s availability to user and aggregates to overall tolerance to fault, component failures. Our study explains the performance of heterogeneous WSN is much more better than the homogeneous WSN. The presence of malicious nodes in the path will break the path so that the trade-off between energy consumption vs QoS gain will get more complicated in both homogenous and heterogeneous WSN. In particular heterogeneous WSN the Cluster heads (CH) may get affected in the data delivery. In this case we use Intrusion Detection System (IDS),which is used to detect and evict the presence of malicious nodes. The model based analysis which is represented as a single term but it defines the redundancy management and the type of routing which is used. In this paper we use the multipath routing which is a best method of routing in this the fault tolerance and data delivery is much improved. Even though the multipath routing is tolerant of fault but by the recent studies tells that the tradeoff issue will reduce the lifetime of the WSN. In the presence of unreliable and malicious nodes the redundancy is routed through a sink node, this is considered to maximize the lifetime of network and is attained by query success probability. This is considered as optimization problem and the voting based intrusion detection algorithm which is used to remove the unreliable nodes. In this paper the model based analysis is introduced in which the multipath redundancy level and intrusion detection setting are used to satisfy the QoS requirements and to maximize the lifetime of the HWSN. For the intrusion tolerance we consider the problem in which the “selection of paths” and the “number of paths” are considered in which the “selection of paths” is solved by using light weighted IDS are used. For “numbers of paths” the paths are chosen depends in which the lifetime of the network is to be maximized. The paper is aligned as follows: In the section II, we discuss the related work which is contrast to our paper and about the existing work carried before. In the section III, we discuss the algorithm which is used in this paper. In the section IV the probability model (i.e.) the expressions in which the capture rate, query rate, reliability and energy consumption are given. In the section V, we discuss the conclusion and future enhancement of this paper.
In this paper we performed model based analysis which had explained the concept of redundancy management by utilizing multipath routing to answer the user queries. The method of IDS is used to identify and evict the attack of malicious nodes. The dynamic redundancy management algorithm is used to identify the best parameter setting so that the lifetime of the system is to be maximized. For Future enhancement we plan to find more malicious attacks and in addition the packet dropping and bad mouthing attacks with different implementations to security, energy and reliability. Another method of “weighted voting” which is used to know the knowledge of neighbor nodes. For applications we use trust-based admission control scheme is used when the query traffic is heavy


  1. C. Haowen and A. Perrig, “PIKE: peer intermediaries for key establishment in sensor networks,” in Proc. 2005 IEEE Conf. ComputerCommun., pp. 524–535.
  2. S. Rajasegarar, C. Leckie, and M. Palaniswami, “Anomaly detection in wireless sensor networks,” IEEE Wireless Commun. Mag., vol. 15, no.4, pp. 34–40, 2008.
  3. Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Commun. Surveys & Tutorials, vol. 10, no. 3, pp. 6–28, 2008. 49–55.
  4. Y. Lan, L. Lei, and G. Fuxiang, “A multipath secure routing protocol based on malicious node detection,” in Proc. 2009 Chinese ControlDecision Conf., pp. 4323–4328.
  5. I. Krontiris, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. 2007 European WirelessConf.
  6. J. H. Cho, I. R. Chen, and P. G. Feng, “Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks,” IEEE Trans. Reliab., vol. 59, no. 1, pp. 231–241, 2010.
  7. D. Somasundaram and R. Marimuthu, “A multipath reliable routing for detection and isolation of malicious nodes in MANET,” in Proc. 2008Int. Conf. Computing, Commun. Netw., pp. 1–8.2010.
  8. Y. Yang, C. Zhong, Y. Sun, and J. Yang, “Network coding based reliable disjoint and braided multipath routing for sensor networks,” J. Netw.Comput. Appl., vol. 33, no. 4, pp. 422–432, 2010.
  9. E. Felemban, L. Chang-Gun, and E. Ekici, “MMSPEED: multipath multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 5, no. 6, pp. 738–754, 2006.
  10. J. Deng, R. Han, and S. Mishra, “INSENS: intrusiontolerant routing for wireless sensor networks,” Computer Commun., vol. 29, no. 2, pp.216–230, 2006.
  11. K. D. Kang, K. Liu, and N. Abu-Ghazaleh, “Securing geographic routing in wireless sensor networks,” in Proc. 2006 Cyber Security Conf. Inf.Assurance.
  12. A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L.B. Ruiz, and H. C. Wong, “Decentralized intrusion detection in wireless sensor networks,” in Proc. 2005 ACM Workshop Quality Service SecurityWireless Mobile Netw.
  13. W. Lou and Y. Kwon, “H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks,” IEEETrans. Veh. Technol., vol. 55, no. 4, pp. 1320–1330, 2006.
  14. H. Su and X. Zhang, “Network lifetime optimization for heterogeneous sensor networks with mixed communication modes,” in Proc. 2007 IEEEWireless Commun. Netw. Conf., pp. 3158–3163.